“Most successful cyber-attacks are still leveraging gaps in basic security measures to achieve their goals — initial access gained through phishing or remote access attacks often leveraging legitimate credentials,” BeyondTrust’s chief security strategist EMEA & APAC, Brian Chappell told Arabian Business. Chappell added these “credentials are often obtained when users reuse company accounts for external websites. Once in the system, the typical attack chain of vulnerability and privileged access enables the attackers to move laterally across the environment until they find valuable information such as that exposed in the Spinney’s attack.”
Read the full story here: https://www.arabianbusiness.co...