May 14, 2024, 7 a.m. |

CSO Online www.csoonline.com






Low-tech attack vectors are being adapted by cyber criminals to overcome security defenses because they can often evade detection until it’s too late. USB-based attacks, QR codes in phishing emails, and social engineering, improved with the help of generative AI, are examples of relatively low-tech tactics being used to launch significant attacks.


This has been confirmed in the latest Verizon Data Breach Investigations Report (DBIR), which found tried-and-true attack tactics continue to be successful, underscoring the fact that organizations …

attack attacks attack vectors can chart criminals cyber cyber criminals defenses detection emails engineering evade examples generative generative ai it security launch low phishing phishing emails qr codes risk security security risk social social engineering tactics tech usb

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC