April 20, 2024

[ad_1]

When hackers want to gain access to a target network, they are most likely to launch a phishing attack, exploit known software vulnerabilities, or simply log in via Remote Desktop Protocol (RDP).

That’s according to a new report from Palo Alto Networks’ cybersecurity department, Unit 42. In its latest work, the company says these three account for more than three-quarters (77%) of all suspected root causes for intrusions.

[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *