Back

History of Hacks: Orphaned Accounts

Welcome to our journey through the History of Hacks. We’l be giving a high-level overview of the techniques behind some of the biggest hacks and data breaches in history, and what we can learn about protecting ourselves. At Veza we believe that while the tools and strategies employed by attackers are constantly evolving, there’ one form of defense that almost always works: Least Privilege.

Today we look at how attackers can take advantage of orphaned or dormant accounts and how organizations can protect themselves.

To learn more about any of the techniques you see here, schedule a demo.

Table of Contents