What do threat actors do with your stolen credentials?

I have written about one of the possible malicious uses of stolen credentials over on CyberAwake and I explain why if one of your team reuses a compromised password your organisation could be at risk.

Read on here.

Clive Catton MSc (Cyber Security) – by-line and other articles

phishing emails
Cyber Security Experts | Awareness | Training (cyberawake.co.uk)
cyberawake 200