The report says that the #1 attack vector is through vulnerabilites in application software: Quicktime, Acrobat, MS office, etc. Victims inadvertently download attacks from a compromised trusted site. The report goes on to detail how this attack is used to gain access to other systems and exfiltrate data. It’s interesting reading.
Cybersecurity Engineer, Cisco
Nick has over 20 years of experience in Security Operations and Security Sales. He is an avid student of cybersecurity and regularly engages with the Infosec community at events like BSides, RVASec, Derbycon and more. The son of an FBI forensics director, Nick holds a B.S. in Criminal Justice and is one of Cisco’s Fire Jumper Elite members. When he’s not working, he writes cyberpunk and punches aliens on his Playstation.