Cybersecurity Authorities List Top 10 Attack Vectors Exploited By Hackers

Share post:

A joint security advisory issued by several national cybersecurity authorities has identified the ten attack vectors most exploited by threat actors.

These attack vectors include the failure to enable multi-factor authentication, improperly applied privileges or permissions and errors in access control lists, out-of-date software, and the use of vendor-supplied default configurations or default login usernames and passwords.

Others include the lack of sufficient control by remote services, failure to implement strict password policies, unprotected cloud services, open ports, misconfigured services, failure to detect or block phishing attempts, and poor endpoint detection and response.

The joint advisory highlights a list of security measures that organizations can take to eliminate poor security measures.

Security measures include the use of control access, hardened MFA credentials and standard password reset, centralized log management, and antivirus and detection tools (including intrusion detection and prevention systems).

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways