Back

Third-Party Access Is the New Insider Threat

Third-party breaches now drive 30% of incidents. Learn how attackers use valid vendor credentials to move undetected, escalate access, and operate like insiders inside your network.

Minutes to listen:
by Dune Research Team
27 Jun 2025
8 min read
June 27, 2025

FAQs

Complete the form below to get started.

What are third-party attacks in cybersecurity?
Why are third-party accounts a growing insider threat?
How do attackers exploit third-party users?
Why are third-party breaches difficult to detect?
How can third-party attacks lead to financial fraud or data loss?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all
Employee sitting at home in front of a Christmas tree, holding a smartphone and credit card while reviewing an online payment, representing how holiday shopping scams and credit card fraud can spill over into the workplace and put company data at risk.

Holiday Scams Are Surging. Here Are the Top Threats Facing Your Workforce.

Discover the top holiday scams affecting employees and how organizations can stay secure during the busiest season of the year.

Blog

The Flight Delay That Launched A Cybersecurity Rocketship - Dune Security

Dune Security CEO David DellaPelle joins CyberBytes to discuss AI-driven social engineering, insider threats, and how user-layer intelligence is reshaping cyber defense.

Featured Podcasts
Remote video job interview highlighting vulnerabilities to deepfake impersonation.

Deepfake Impersonation in Remote Hiring

Deepfake job applicants are exploiting remote hiring workflows, and organizations need to act quickly to keep synthetic identities out of the workforce.

Blog

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.