35 Min.

Season 2: Episode 3 - Access Attacks Take Top Spot F5 Labs Threat Research

    • Technologie

The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users.

The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users.

35 Min.

Top‑Podcasts in Technologie

Passwort - der Podcast von heise security
Dr. Christopher Kunz, Sylvester Tremmel
13 Minutes to the Moon
BBC World Service
Apfelfunk
Malte Kirchner & Jean-Claude Frick
Acquired
Ben Gilbert and David Rosenthal
Mac & i - der Apple-Podcast
Mac & i
#heiseshow (Audio) - Technik-News und Netzpolitik
heise online