Five Eyes Alliance advises on Top 10 Initial Attack Vectors. Malicious threat actors regularly use techniques such as exploiting public-facing applications, external remote services, phishing and trusted relationships to gain initial access into victims’ systems. Misconfigured or unconfigured security configurations, weak controls and a lack of proper authentication protocols are among the 10 most common initial access vectors “routinely exploited” by threat actors, the alliance of cybersecurity authorities from the United States, the United Kingdom, Australia, New Zealand and Canada.”]
Source: https://www.cuinfosecurity.com/five-eyes-alliance-advises-on-top-10-initial-attack-vectors-a-19097

