Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a 31-minute conference talk from BSidesSF 2025 that addresses the critical cybersecurity challenge of credential-based attacks. Learn how cybercriminals are bypassing traditional security measures by purchasing stolen credentials from the dark web and gaining unauthorized access to networks through legitimate login processes rather than breaking in through vulnerabilities. Discover the alarming statistic that 80% of cyberattacks now involve stolen credentials and understand why traditional perimeter defenses are insufficient against this threat vector. Examine Automated Credential Threat Monitoring (ACT) as a proactive defense strategy that helps organizations stay ahead of credential-based threats by continuously monitoring for compromised credentials before they can be exploited. Gain insights into how organizations can shift from reactive to proactive security postures by implementing automated systems that detect and respond to credential leaks in real-time, effectively closing the window of opportunity for attackers who rely on stolen authentication data.