You need to know how a user-based attack unfolds in order to detect and stop it. This whitepaper maps the entire series of attacker behaviours from compromising user credentials to exfiltrating data, called “the user-based attacks kill chain”. Thwarting an attack at any point along the chain will minimise damage and “kill” the attack.
Watch this on-demand webinar to hear Rapid7 product managers Christian Kirsch and Lital Asher-Dotan discuss:
Download this free, limited features edition of InsightUBA to try the most effective solution for detecting and investigating user-based attacks at every stage of the kill chain.
Get quick tips on how you can better detect malicious and compromised users across your network, cloud services, and mobile environments.
The most comprehensive analysis of security breaches and incidents across 27 countries. Read the full report and find out why you should be looking at your users.


According to the Verizon Data Breach Investigations Report (DBIR) of 2014, compromised credentials are now the most commonly-used threat action. Stolen credentials were the most prevalent method for breaking into networks. At the same time, compromising user accounts via phishing and social engineering techniques was the third-most used attacker tool. As user-based attacks are now more common than ever, you must make detecting them a priority today. To help you build a robust user protection plan, we’ve assembled a toolkit for you.
In this whiteboard video, Lital Asher-Dotan, Senior Product Marketing Manager for UserInsight at Rapid7 will discuss the current chain of events an attacker must take to successfully exfiltrate data from your network.