Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cybercriminals Rely on Valid Credentials and App Exploits to Breach Networks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cybercriminals Rely on Valid Credentials and App Exploits to Breach Networks

Highlights

  • Identity-based attacks dominate cyber intrusion methods.

  • Manufacturing faces the highest number of cyberattacks.

  • Robust credential management is crucial for security.

Kaan Demirel
Last updated: 22 April, 2025 - 6:09 pm 6:09 pm
Kaan Demirel 2 months ago
Share
SHARE

Cyberattacks continue to evolve, with identity-based methods remaining the primary technique for infiltrating networks. In 2024, IBM X-Force reported that nearly one-third of intrusion attempts exploited valid account credentials and public-facing applications. The persistence of these tactics underscores the need for robust cybersecurity measures across various industries.

Contents
How Do Identity-Based Attacks Operate?Which Industries Are Most Affected?What Can Organizations Do to Mitigate These Threats?

Recent analyses indicate a significant rise in phishing attempts and the distribution of infostealers, tools designed to harvest sensitive information. This trend reflects a broader shift towards leveraging existing access points rather than seeking new vulnerabilities.

How Do Identity-Based Attacks Operate?

Identity-based attacks blend seamlessly with regular network activities, making them harder to detect. Cybercriminals use techniques like phishing emails to obtain login credentials, which are then used to access multiple systems. “They’re logging in, versus hacking in,” stated Michelle Alvarez, manager of the IBM X-Force threat intelligence team.

Which Industries Are Most Affected?

Critical infrastructure sectors, particularly manufacturing, face the highest number of attacks. Manufacturing accounted for 26% of all incidents in 2024, followed by finance and insurance at 23%. These industries are prime targets due to the valuable data they handle and the potential impact of breaches.

What Can Organizations Do to Mitigate These Threats?

Implementing strong credential management and regular vulnerability assessments are essential strategies. Effective vulnerability management practices can prevent attackers from exploiting known weaknesses. “We see vulnerabilities from years ago that had a patch available for a long time still being exploited,” Alvarez noted.

The reliance on valid credentials and the exploitation of public-facing applications highlight the importance of continuous monitoring and updating security protocols. As cyber threats become more sophisticated, organizations must adapt their defenses to protect sensitive information and maintain operational integrity.

Strengthening authentication methods and educating employees about phishing risks are critical steps in reducing the risk of credential theft. Additionally, regular audits of public-facing applications can help identify and remediate vulnerabilities before they are exploited by threat actors.

Ensuring comprehensive security measures and proactive threat intelligence can significantly enhance an organization’s resilience against persistent cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Trump Signs Executive Order Shifting Federal Cybersecurity Priorities

U.S. Authorities Seize $7.7M Linked to North Korean Crypto Laundering

Sean Cairncross Outlines Cyber Coordination Plans to Senate Panel

Feds Seize BidenCash Domains in Crackdown on Stolen Data Market

AI Drives Coding Boom, Sparks Security Debates in Software Development

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Google Launches A2A Protocol to Connect AI Agents
Next Article Tesla Prepares for Q1 2025 Earnings Release

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Guess “REUSE” and Learn from Daily Puzzles
Gaming
PlusAI Takes Public Path as It Pursues Autonomous Trucking Rollout
Robotics
Tesla Adds Heated Steering Wheel Update for Cold Weather Driving
Electric Vehicle
Industry Leaders Tackle Mobile Robot Integration in Warehouses
Robotics
Tesla Builds 8 Millionth Car as Model Y Leads Global Production
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?