Hacking
Hacking falls into 3 distinct groups:
1. Utilizing stolen or brute-forced credentials
2. Exploiting vulnerabilities
3. Utilizing backdoors and Command and Control (C2) functionality Over 80% of hacking breaches involve the use of brute force or lost/stolen credentials. Oftentimes these credentials are used in conjunction with attacks against web applications.
* Statistic from 2020 Data Breach Investigations Report.
17
Made with FlippingBook - Online catalogs