Geek-Guy.com

Category: Cyberattacks, Cybercrime, Identity and Access Management, Incident Response, Phishing, Threat and Vulnerability Management, Vulnerabilities

Cybercriminals switch up their top initial access vectors of choice

Third-party involvement in breaches and exploitation of vulnerabilities have become more important factors in security breaches, according to the latest edition of Verizon’s Data Breach Investigation Report (DBIR). An analysis of 22,000 security incidents, including 12,195 confirmed data breaches in 139 countries, found that credential abuse (22%) and exploitation of vulnerabilities (20%, up from 14.9%…