Other credential compromise techniques used to target SaaS applications included self-service password reset (24%), single-factor password guessing (14%), and push fatigue (13%).
Other credential compromise techniques used to target SaaS applications included self-service password reset (24%), single-factor password guessing (14%), and push fatigue (13%). — This cybersecurity statistic was published by Obsidian Security in January 2025. The original data appears in SaaS Security Threat Report 2025. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
Other credential compromise techniques used to target SaaS applications included self-service password reset (24%), single-factor password guessing (14%), and push fatigue (13%). This data was published by Obsidian Security.
Where does this data come from?
This statistic comes from SaaS Security Threat Report 2025, published by Obsidian Security on January 1, 2025. You can view the original report at https://www.obsidiansecurity.com/saas-security-threat-report.
What cybersecurity topics does this cover?
This statistic was published by Obsidian Security. Browse more statistics from Obsidian Security.