
Sign up to save your podcasts
Or


When an adversary seeks entry into an organization, they no longer need to develop their own vulnerability exploits or steal credentials.
Many turn to access brokers, the sellers of credentials, exploits and other tools threat actors can buy and use to gain initial access. In this episode, we discuss who access brokers are, how they gain and sell access, and their crucial role in the cybercrime ecosystem.
By CrowdStrike4.9
7777 ratings
When an adversary seeks entry into an organization, they no longer need to develop their own vulnerability exploits or steal credentials.
Many turn to access brokers, the sellers of credentials, exploits and other tools threat actors can buy and use to gain initial access. In this episode, we discuss who access brokers are, how they gain and sell access, and their crucial role in the cybercrime ecosystem.

189 Listeners

2,010 Listeners

371 Listeners

374 Listeners

651 Listeners

1,023 Listeners

318 Listeners

417 Listeners

8,049 Listeners

181 Listeners

316 Listeners

189 Listeners

74 Listeners

137 Listeners

44 Listeners