Cybersecurity company Circle Security has emerged from stealth with the release of a new platform \u201cpurpose-built\u201d to protect against credential-driven threats and cloud attacks. Powered by a decentralized architecture, Circle is available as a device-native service, a mobile app, a browser-based solution, and via a developer-focused API, according to the firm.Circle Security boasts an impressive advisory board featuring several high-profile cybersecurity thought leaders including Bruce Schneier, Lucia Milica, global CISO of Proofpoint, and Eric Liebowitz, CISO of Thales Group.Credential-driven data breaches are the biggest threat vector for most companies. Cybercriminals are prioritizing stolen credentials for use in attacks, with weak credentials significant contributors to cloud security risks. Meanwhile, access brokers \u2013 criminal groups that sell stolen access credentials \u2013 have become a key component of the eCrime threat landscape.Circle platform offers \u201cnew level of security\u201d against phishing, credential-stealing attacksCircle\u2019s decentralized platform ensures secure access to cloud data and applications while protecting data during sign-in and throughout the user journey, no matter where the data travels, the company said in a press release. \u201cThe result is that enterprises can now rely on a single platform to secure access to sensitive data and protect it from exposure with full visibility and control on whichever user devices it resides,\u201d it added.Circle cryptographically unifies the capabilities of device trust, data access, and data protection into a unified platform capable of preventing credential-driven attacks and cloud compromise, the firm claimed. By reducing the user\u2019s capability to authenticate on their own, the system provides a new level of security against phishing and other credential-stealing attacks, according to Schneier. Circle is available in Base, Standard, and Premium options, each priced accordingly.Credential-focused cyberattacks plague organizations, empower cybercriminal activityCredential-focused cyberattacks are plaguing organizations and empowering cybercriminal activity. Last year, threat actors exposed or stole 22.62 billion credentials and personal records, ranging from account and financial information to emails and US Social Security numbers, according to a recent report from Flashpoint. \u201cThe proliferation of illegally obtained data gives threat actors ample opportunities to circumvent organizational security measures and controls \u2013 empowering ransomware groups like LockBit to hold data for ransom, or sell or expose it on illicit markets,\u201d the report read.Cybercriminals are doubling down on stolen credentials, demonstrating a clear demand for access broker services. There was a 112% year-over-year increase in advertisements for access broker services identified last year compared to 2021, with more than 2,500 advertisements for access detected across the criminal underground, according to the CrowdStrike 2023 Global Threat Report. There was also a notable shift away from malware use related to adversaries\u2019 prolific abuse of valid credentials to facilitate access and persistence in victim environments, the research found.What\u2019s more, weak credentials contribute significantly to persistent cloud security risks. The latest Unit 42 Cloud Threat Report found that 76% of organizations don\u2019t enforce MFA for console users, 58% don\u2019t enforce MFA for root\/admin users, and 57% don\u2019t enforce symbols in passwords.