Cyberstats

Security Intelligence

TopicsVendorsBlogSearchGet fresh stats weekly
Home›Topics›Valid accounts

Valid accounts

Cybersecurity statistics about valid accounts

Top Vendors

DirectDefense2IBM 1

Showing 1-3 of 3 results

Nearly one in three attacks observed by X-Force used valid accounts.

IBM •4/17/2025•
Cyber attack

For Initial Access, the most observed technique by DirectDefense is Valid Accounts, which involves leveraging stolen credentials for unauthorized access. Alerts triggered for Initial Access include: First Ingress Authentication from Country, Multiple Country Ingress Authentications, Multiple Wireless Country Authentications.

DirectDefense•4/15/2025•
MITRE ATT&CKInitial access

For Lateral Movement, the most observed technique by DirectDefense is Valid Accounts, using stolen credentials to escalate privileges. Alerts triggered for Lateral Movement include: Lateral Movement – Local Credentials.

DirectDefense•4/15/2025•
MITRE ATT&CKLateral movement
Cyberstats

Fresh, direct cybersecurity statistics, trends and market data. No fluff.

Get Started

Sign Up Free

Join 1,000+ security professionals

Stay Updated

Get weekly cybersecurity insights

© 2025 Cyberstats. All rights reserved.

Privacy PolicyTerms of ServiceSitemap