Breach Desk

Credential Signals

A compact desk for the recurring password-related failure patterns that matter most: reuse, phishing-resistant auth gaps, and operational shortcuts around recovery.

Severity
Category
2026-04-08

Critical | Reuse

Credential stuffing after old password reuse

Attackers commonly take credential dumps from unrelated breaches and replay them against consumer and business services. Unique passwords cut off that path immediately.

Response: Rotate reused credentials, review vault reports, and prioritize MFA on accounts tied to recovery or payments.

2026-04-04

High | Phishing

Phishing bypasses strong passwords with live session theft

A strong password may still be captured through fake sign-in pages, adversary-in-the-middle kits, or malicious OAuth prompts.

Response: Deploy passkeys where possible and train users to verify domains, device prompts, and approval flows.

2026-03-28

High | Recovery

Weak helpdesk recovery scripts create identity shortcuts

Support teams often become an unintentional reset channel if caller verification is soft or based on public information.

Response: Tighten recovery policy, audit support scripts, and log any manual overrides or exceptional resets.

2026-03-15

Medium | Shared Secrets

Vendor offboarding leaves old shared credentials active

External contractors and vendors often retain access longer than intended when team secrets are shared informally.

Response: Move shared credentials into a vault, rotate at offboarding, and review access ownership regularly.

2026-03-06

Medium | MFA

Push fatigue still turns strong passwords into a false comfort

Users hit approve on repeated prompts after password theft or session hijacking pressure, collapsing the second factor.

Response: Favor phishing-resistant MFA and train users to treat unexpected prompts as incidents, not annoyances.

2026-02-21

Low | Visibility

Teams miss silent risk because no one reviews vault health

Even well-equipped teams accumulate weak, stale, or duplicated entries if nobody owns hygiene reviews.

Response: Assign a cadence for vault audits and track reuse, age, and high-value account coverage.

Filterable timeline loaded.

Signal Cards

Critical Signal

Credential stuffing after old password reuse

Attackers commonly take credential dumps from unrelated breaches and replay them against consumer and business services. Unique passwords cut off that path immediately.

Response: Rotate reused credentials, review vault reports, and prioritize MFA on accounts tied to recovery or payments.

High Signal

Phishing bypasses strong passwords with live session theft

A strong password may still be captured through fake sign-in pages, adversary-in-the-middle kits, or malicious OAuth prompts.

Response: Deploy passkeys where possible and train users to verify domains, device prompts, and approval flows.

High Signal

Weak helpdesk recovery scripts create identity shortcuts

Support teams often become an unintentional reset channel if caller verification is soft or based on public information.

Response: Tighten recovery policy, audit support scripts, and log any manual overrides or exceptional resets.

Medium Signal

Vendor offboarding leaves old shared credentials active

External contractors and vendors often retain access longer than intended when team secrets are shared informally.

Response: Move shared credentials into a vault, rotate at offboarding, and review access ownership regularly.

Medium Signal

Push fatigue still turns strong passwords into a false comfort

Users hit approve on repeated prompts after password theft or session hijacking pressure, collapsing the second factor.

Response: Favor phishing-resistant MFA and train users to treat unexpected prompts as incidents, not annoyances.

Low Signal

Teams miss silent risk because no one reviews vault health

Even well-equipped teams accumulate weak, stale, or duplicated entries if nobody owns hygiene reviews.

Response: Assign a cadence for vault audits and track reuse, age, and high-value account coverage.

Operator View

Most password incidents are boring and repeatable

That is the good news. The same recurring classes of failure keep showing up, which means a disciplined vault, better recovery controls, and phishing-resistant authentication prevent a lot of pain.

What To Prioritize

Fix the account graph, not just one secret

Email, identity providers, admin consoles, finance, and recovery channels form the core of your account graph. Hardening those nodes gives the biggest defensive return.