Attackers Don’t Need Vulnerabilities When the Basics Work Just as Well

You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin a network and compromise sensitive data. Josh Abraham, a practice manager for Praetorian, recently compiled a report on common attack vectors used during 100 pen […]