The Previous Methods Are Nonetheless the Finest for Most Cybercriminals


attackers and defenders. Cybercrime teams often are assumed to be early adopters of recent know-how, used to outwit their adversaries and obtain their targets. However in actuality, the image is extra nuanced than that.

Whereas the cybercriminal underground has professionalized and turn out to be extra organized in recent times, risk actors are, to an awesome extent, nonetheless utilizing the identical assault strategies at this time as they had been in 2020. This presents a big alternative for community defenders — however provided that they’re ready to proactively embrace rising applied sciences like synthetic intelligence (AI).

Tried-and-True Techniques Proceed to Dominate

Menace researchers are at all times analyzing and predicting novel assaults. Because the cybersecurity panorama evolves, it’s essential for analysis groups to anticipate the place attackers might focus their efforts subsequent and make their organizations extra resilient. It’s equally vital to share these insights with the broader cyber neighborhood to make the digital world safer.

Nonetheless, risk actors are largely nonetheless utilizing tried-and-true techniques like phishing, vulnerability exploitation, and compromised account credentials to attain preliminary entry. That is borne out by third-party information as effectively. Credential abuse (22%), exploitation of vulnerabilities (20%), and phishing (19%) had been the primary information breach assault vectors over the previous yr, in response to Verizon. There was a 34% annual improve in vulnerability exploitation this yr, whereas staff had been concerned in 60% of breaches, pushed by credential compromise and social engineering.

 

Learn the Full Article on Darkish Studying



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles