Advertisement
Top

Attackers don’t need vulnerabilities when the basics work just as well

August 22, 2016

Category:

You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin a network and compromise sensitive data.

Josh Abraham, a practice manager for Praetorian, recently compiled a report on common attack vectors used during 100 pen test engagements at 75 different organizations between 2013 and 2016.

Read More on CSO Online