Compromised Credentials Toolkit

Resources to help investigate compromised users in your organization


Fill out the form below to download this toolkit

According to the Verizon Data Breach Investigations Report (DBIR) of 2014, compromised credentials are now the most commonly-used threat action. Stolen credentials were the most prevalent method for breaking into networks. At the same time, compromising user accounts via phishing and social engineering techniques was the third-most used attacker tool. As user-based attacks are now more common than ever, you must make detecting them a priority today. To help you build a robust user protection plan, we’ve assembled a toolkit for you.

This toolkit includes:

  • Research Report: Verizon 2014 Data Breach Investigations Report
  • Whitepaper: Top Ten Tips for Detecting Malicious and Compromised Users
  • Whitepaper: User-Based Attacks – The Kill Chain
  • Video: How to Protect Against User-Based Attacks
  • Video: How to Detect Compromised Users: Breaking the User Kill Chain
  • Whitepaper: Detect, Investigate, Scrutinize and Contain with Rapid7 InsightUBA (formerly UserInsight)