Can users be leveraged as an attack surface in cyber attacks?
Very much yes! While you and I might not be part of a computer system, our interaction channels create an extended attack surface for cybercriminals to launch attacks.
What are the various channels?
· Phishing Attacks
· Weak Passwords
· Social Engineering
· Malware and Ransomware
· Unpatched systems
· Removable Media
Youtube: https://youtu.be/vT8RRBenyU8
Comments