Subscribe to our Newsletter!
By subscribing to our newsletter, you agree with our privacy terms
Home > Cybersecurity > 10 most common cyber-attack vectors and defence measures
May 20, 2022
The tactics used by malicious actors seeking to promote cyber attacks vary. They often exploit misconfigurations, weak controls and other cybersecurity malpractices that facilitate unauthorised access to victims’ systems.
A paper co-authored by cyber security officials from the United States, Canada, New Zealand, the Netherlands and the United Kingdom, released by the US Cybersecurity and Infrastructure Agency (CISA), brought together both the main tactics used to breach networks and methods that can be adopted to mitigate the risks of attacks.
The most common exploitation tactics usually seek:
In addition to listing these attack vectors, the CISA document also recommends practices that can help strengthen defences against the most exploited weak security controls:
November 25, 2022
November 14, 2022
November 03, 2022
October 18, 2022
October 13, 2022
October 05, 2022
September 19, 2022
Previous
Healthcare industry needs to expand anti-ransomware defenses
Next
Cyber defence of the energy sector is deficient