Stolen credentials edge out email tricks for cloud break-ins because they’re so easy to get

Criminals used stolen credentials more frequently than email phishing to gain access into their victims’ IT systems last year, marking the first time that compromised login details claimed the number two spot in Mandiant’s list of most common initial infection vectors.…