
Sign up to save your podcasts
Or


When an adversary seeks entry into an organization, they no longer need to develop their own vulnerability exploits or steal credentials.
Many turn to access brokers, the sellers of credentials, exploits and other tools threat actors can buy and use to gain initial access. In this episode, we discuss who access brokers are, how they gain and sell access, and their crucial role in the cybercrime ecosystem.
By CrowdStrike4.9
7777 ratings
When an adversary seeks entry into an organization, they no longer need to develop their own vulnerability exploits or steal credentials.
Many turn to access brokers, the sellers of credentials, exploits and other tools threat actors can buy and use to gain initial access. In this episode, we discuss who access brokers are, how they gain and sell access, and their crucial role in the cybercrime ecosystem.

16,174 Listeners

371 Listeners

651 Listeners

1,065 Listeners

1,028 Listeners

281 Listeners

418 Listeners

291 Listeners

8,077 Listeners

175 Listeners

139 Listeners

5,576 Listeners

16,525 Listeners

55 Listeners

23 Listeners