all InfoSec news
Low-tech tactics still top the IT security risk chart
CSO Online www.csoonline.com
Low-tech attack vectors are being adapted by cyber criminals to overcome security defenses because they can often evade detection until it’s too late. USB-based attacks, QR codes in phishing emails, and social engineering, improved with the help of generative AI, are examples of relatively low-tech tactics being used to launch significant attacks.
This has been confirmed in the latest Verizon Data Breach Investigations Report (DBIR), which found tried-and-true attack tactics continue to be successful, underscoring the fact that organizations …
attack attacks attack vectors can chart criminals cyber cyber criminals defenses detection emails engineering evade examples generative generative ai it security launch low phishing phishing emails qr codes risk security security risk social social engineering tactics tech usb