Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cybercriminals Rely on Valid Credentials and App Exploits to Breach Networks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cybercriminals Rely on Valid Credentials and App Exploits to Breach Networks

Highlights

  • Identity-based attacks dominate cyber intrusion methods.

  • Manufacturing faces the highest number of cyberattacks.

  • Robust credential management is crucial for security.

Kaan Demirel
Last updated: 22 April, 2025 - 6:09 pm 6:09 pm
Kaan Demirel 3 weeks ago
Share
SHARE

Cyberattacks continue to evolve, with identity-based methods remaining the primary technique for infiltrating networks. In 2024, IBM X-Force reported that nearly one-third of intrusion attempts exploited valid account credentials and public-facing applications. The persistence of these tactics underscores the need for robust cybersecurity measures across various industries.

Contents
How Do Identity-Based Attacks Operate?Which Industries Are Most Affected?What Can Organizations Do to Mitigate These Threats?

Recent analyses indicate a significant rise in phishing attempts and the distribution of infostealers, tools designed to harvest sensitive information. This trend reflects a broader shift towards leveraging existing access points rather than seeking new vulnerabilities.

How Do Identity-Based Attacks Operate?

Identity-based attacks blend seamlessly with regular network activities, making them harder to detect. Cybercriminals use techniques like phishing emails to obtain login credentials, which are then used to access multiple systems. “They’re logging in, versus hacking in,” stated Michelle Alvarez, manager of the IBM X-Force threat intelligence team.

Which Industries Are Most Affected?

Critical infrastructure sectors, particularly manufacturing, face the highest number of attacks. Manufacturing accounted for 26% of all incidents in 2024, followed by finance and insurance at 23%. These industries are prime targets due to the valuable data they handle and the potential impact of breaches.

What Can Organizations Do to Mitigate These Threats?

Implementing strong credential management and regular vulnerability assessments are essential strategies. Effective vulnerability management practices can prevent attackers from exploiting known weaknesses. “We see vulnerabilities from years ago that had a patch available for a long time still being exploited,” Alvarez noted.

The reliance on valid credentials and the exploitation of public-facing applications highlight the importance of continuous monitoring and updating security protocols. As cyber threats become more sophisticated, organizations must adapt their defenses to protect sensitive information and maintain operational integrity.

Strengthening authentication methods and educating employees about phishing risks are critical steps in reducing the risk of credential theft. Additionally, regular audits of public-facing applications can help identify and remediate vulnerabilities before they are exploited by threat actors.

Ensuring comprehensive security measures and proactive threat intelligence can significantly enhance an organization’s resilience against persistent cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CIOs Tackle Quantum Threat in Encryption Race

FTC Seeks New Tools to Combat Deepfake Pornography

Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure

North Korea Builds Cyber Network Resembling a Mafia Operation

Cybercriminals Invest Illicit Profits in Surprising Ventures

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Google Launches A2A Protocol to Connect AI Agents
Next Article Tesla Prepares for Q1 2025 Earnings Release

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Hideo Kojima Plans for His Legacy with Digital Memoir
Gaming
Tesla Pushes FSD Limits with Global Demonstrations
Electric Vehicle
US Enforces Global AI Chip Ban, Faces Geopolitical Challenges
AI
Wordle Challenges Players with Tricky Puzzle
Gaming
Huawei Unveils New Smart Watch With Health Tracking Features
Wearables
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?