Back

Third-Party Access Is the New Insider Threat

Third-party breaches now drive 30% of incidents. Learn how attackers use valid vendor credentials to move undetected, escalate access, and operate like insiders inside your network.

by Dune Research Team
27 Jun 2025
5 min read

FAQs

Complete the form below to get started.

What are third-party attacks in cybersecurity?
Why are third-party accounts a growing insider threat?
How do attackers exploit third-party users?
Why are third-party breaches difficult to detect?
How can third-party attacks lead to financial fraud or data loss?

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.