Season 2: Episode 3 - Access Attacks Take Top Spot

F5 Labs Threat Research Podcast

The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users.

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada