Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits

Infection vectors were evenly divided among phishing, vulnerability exploitation, and unauthorized credential use in 2019.

This post appeared first on Dark Reading
Author: Kelly Sheridan Staff Editor, Dark Reading