While it might seem like company databases are filled with mundane files, hackers know the harsh reality. According to Verizon’s Data Breach Investigations Report, the culprits behind cyber attacks come from various corners – outsiders, insiders, company partners, organized crime groups, and affiliated parties.
Here’s a closer look at the percentages for each category:
Source: Embroker, Verizon
Author
Péter Szöllősi
OFFENSIVE SECURITY MANAGER
Peter has been the Head of Offensive Security at Black Cell for five years, where he manages the pentester team responsible for providing high-quality ethical hacking services to clients to enhance their security posture. He also contributes to the maintenance and improvement of Black Cell’s security posture with internal and external audits.
Related Posts
Tool Tip: How to create honey folders?
In today's blog post, we will be going over how to create honey folders with no additional...
Cybersecurity Tool Spotlight: DeepBlueCLI
Searching through Windows event logs can be a daunting task even for the most seasoned...