October 5, 2022


When hackers want to gain access to a target network, they are most likely to launch a phishing attack, exploit known software vulnerabilities, or simply log in via Remote Desktop Protocol (RDP).

That’s according to a new report from Palo Alto Networks’ cybersecurity department, Unit 42. In its latest work, the company says these three account for more than three-quarters (77%) of all suspected root causes for intrusions.



Source link

Leave a Reply

Your email address will not be published.