AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Introduction
Attackers are using what works best for them in regions that they're targeting, specifically for initial infection factors. In the Americas, we saw that exploits were a driving force in those intrusions. There was a heavy use of phishing to gain access into environments for conducting intrusion operations. And then AIPAC, we saw a continued use of prior access.