Phishing and malware are scary enough, but the number one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why?…