{"id":284,"date":"2021-11-18T23:46:00","date_gmt":"2021-11-18T23:46:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=284"},"modified":"2024-01-22T09:00:25","modified_gmt":"2024-01-22T17:00:25","slug":"top-attack-vectors-and-how-to-prevent-them","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/","title":{"rendered":"Top Attack Vectors and How to Prevent Them"},"content":{"rendered":"\n<p>Ransomware, supply chain disruption, social engineering leading to credential theft\u2014cyber attacks seem to be disrupting businesses and lives regularly. How do you help ensure your organization does not fall victim?<\/p>\n\n\n\n<p>To prevent an attack, it\u2019s crucial to understand how attackers find their way into your network in the first place. We did some research and found some of the most common attack vectors. The question is: how many of them are available on your attack surface right now? Our (my) recommendation: get a solution that can find them, and prioritize them based on risk, then start remediating or mitigating.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Let\u2019s distinguish an attack vector from attack surface and breaches<\/h2>\n\n\n\n<p>Attack vectors are the path that an attacker uses to gain access to your organization\u2019s network. This includes exposed assets or abandoned assets, but also unpatched software vulnerabilities, misconfigured software, weak authentication, and domain hijacking.<\/p>\n\n\n\n<p>The total sum of these exposed IT assets are the attack surface. These could be secure or vulnerable, known or unknown, active or not in use, on-premise or in the cloud and&nbsp;in subsidiary or third-party environments.<\/p>\n\n\n\n<p>A security incident happens when an unauthorized party gets into your IT ecosystem and gains access to your organization\u2019s sensitive, protected, or confidential data or can take control of your systems. This can have significant impacts on your brand, customers, and bottom line. A few examples of security breaches include the\u00a0<a href=\"\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\">Colonial Pipeline ransomware<\/a>,\u00a0<a href=\"https:\/\/techcrunch.com\/2021\/11\/09\/robinhood-data-breach\/\">Robinhood customer data breach<\/a>, and the exposure of FireEye\u2019s red team tools through the\u00a0<a href=\"\/blog\/how-to-improve-security-posture\/\">SolarWinds supply chain attack<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The challenge with detection solutions today<\/h2>\n\n\n\n<p>Vulnerability scanners are used by organizations to monitor their networks, systems, and applications for security gaps. They identify a range of tens of thousands of Common Vulnerabilities and Exposures (CVEs). Matching scans of your organization against a CVE list identifies outdated software that needs patching and other common issues.<\/p>\n\n\n\n<p>When presented with a long list of findings from the scan, it\u2019s easy to assume that your organization is being thoroughly assessed. However, CVEs alone aren\u2019t enough to gauge risk. There are more potential issues that your team needs to detect in order to outmaneuver attackers.<\/p>\n\n\n\n<p>What about data on an FTP server? Vulnerability scanners are interested in vulnerabilities, not data exposed by a misconfiguration, and finding the data is a multi-step process usually requiring an expensive penetration tester.<\/p>\n\n\n\n<p>What about identification of dangling DNS which can easily lead to subdomain takeover and potential third party attacks and loss of reputation? Vulnerability scans just can\u2019t detect these, either. To understand the full extent of your risk, you need to discover all of the attack vectors that attackers can use.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"354\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png\" alt=\"\" class=\"wp-image-285\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-512x141.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-768x212.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1536x424.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37.png 1600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p><em>Figure 1: Exposed data on an FTP<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">15 attack vectors your organization should look out for:<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\">1. Abandoned assets<\/h5>\n\n\n\n<p>When assets haven\u2019t been updated in a long time or are running outdated services, they\u2019ll be vulnerable to targeted attacks. Common instances include abandoned assets that are exposed for extended periods of time without any mechanism to detect attacks in place. It also includes abandoned assets running\u00a0<a href=\"\/blog\/what-the-microsoft-exchange-zero-days-tell-us-about-the-attack-surface\/\">end-of-life or outdated software<\/a>\u00a0with multiple exploitable vulnerabilities. And sometimes there are dead giveaways, like a \u00a9 2018 on the bottom of a webpage or login screen.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2. Misconfigured cloud components<\/h5>\n\n\n\n<p><a href=\"https:\/\/blogs.gartner.com\/andrew-lerner\/2020\/11\/10\/four-cloudy-predictions\/\">With 99% of cloud breaches predicted to be misconfigurations<\/a>, attackers can easily gain access into cloud information systems. This happens when organizations don\u2019t configure the cloud-based system correctly, and this often results from lack of awareness of new and existing cloud security and policies. It can also be due to a lack of adequate controls and oversight, negligent insider behavior, or too many cloud APIs and interfaces.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">3. Exposed remote access services<\/h5>\n\n\n\n<p>Exposed systems that offer remote access services are attractive to attackers for obvious reasons: gaining access allows full system administration privileges and a convenient platform for further attacks into the network. Remote Desktop Protocol (RDP) and Secure Shell (SSH) are the most commonly used remote access protocols and notoriously popular targets when unconfigured or misconfigured. Oh, and they can install and propagate ransomware without relying on finding an employee to trick into clicking a link.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">4. Default credentials<\/h5>\n\n\n\n<p>Credentials that have been shipped with the device and remained unchanged allow for attackers to access the device with the help of user manuals. For example, a remote attacker can gain access to a router with a default username and password. Default credentials almost always represent a path of least resistance for attackers, especially when it\u2019s internet-facing and connected to other devices within an organization. At least make it&nbsp;<em>a little<\/em>&nbsp;difficult: like @dmin. Or passw0rd.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">5. Data exposures<\/h5>\n\n\n\n<p>Typically when there\u2019s misconfiguration or default configurations, sensitive files, configuration details, or personal data can be exposed. For your organization this could include intellectual property, user or password lists, logs or history, and code. You\u2019d be surprised how much information could be found in a log[.]txt file.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">6. Bypassable authentication mechanisms<\/h5>\n\n\n\n<p>Weak or unsafe login mechanisms put authentication at risk. For example, a login that doesn\u2019t mitigate brute force attacks because there\u2019s no limit on password attempts. Avoid weak authentication by implementing robust mechanisms, such as challenge-response or limited password attempts. And make sure failed attempts are logged.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">7. Web application and database risks<\/h5>\n\n\n\n<p>Insecure code issues and vulnerable third-party software components enable attackers to take control of assets. The interface between the web application and database can be exploited through SQL injections, authentication flaws, and privilege escalation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"764\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-38-1280x764.png\" alt=\"\" class=\"wp-image-286\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-38-1280x764.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-38-512x306.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-38-768x458.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-38-1536x917.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-38.png 1600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p><em>Figure 2: An example of a dangling DNS<\/em><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">8. DNS and mail server hijacking<\/h5>\n\n\n\n<p>These attack vectors can significantly damage your organization\u2019s reputation. Email servers can be taken over commonly for impersonations, phishing users by posing as your organization\u2019s CEO, shareholders, or other employees. Domain takeovers and DNS hijacking can redirect legitimate users to malicious sites.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">9. Software vulnerabilities<\/h5>\n\n\n\n<p>This is when a flaw exists in commercial software that can potentially be exploited with attack tools. For the most part, these will be high severity vulnerabilities that are well known and easily exploitable. For example, CVE-2020-3421 is a vulnerability in Cisco Small Business RV042 and its routers that could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against users.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">10. Exposed internal assets or sensitive ports<\/h5>\n\n\n\n<p>The network topology itself can provide an easy avenue of attack. This includes internet-facing assets which should be protected by at least a firewall or DMZ, yet seem to have no mitigating security controls in place as well as services running on internet-facing hosts with non-standard ports which might indicate an already compromised host or one that could be easily compromised.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">11. Unencrypted communications and cryptographic weaknesses<\/h5>\n\n\n\n<p>These attack vectors expose data about a system, or on a system, to attackers. Whether it\u2019s because the login mechanism or communication channel is either unauthenticated or unencrypted, or the cryptography used to secure communications is exploitable, attackers will take advantage of weaknesses that leave data exposed.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">12. Certificate trust vulnerabilities<\/h5>\n\n\n\n<p>These are issues that involve certificate trust chains, where digital certificates identify assets and also secure communications. Vulnerabilities enable attackers to intercept encrypted communications, for example, via man-in-the-middle attacks. The opportunity to misuse an organization\u2019s certificates will create a major trust issue with customers and the public.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">13. SaaS platform takeover risks<\/h5>\n\n\n\n<p>Software-as-a-Service (SaaS) providers introduce risk to your organization because of their access to your operations. If the provider has poor security and access controls, attackers can gain access to your systems and attack your data. Ensure clarity in the contract and conduct a compliance audit to make sure the SaaS provider is secure.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">14. Inactive IP addresses<\/h5>\n\n\n\n<p>When the IP address has been handed out by your organization\u2019s DHCP server the address is considered inactive. This makes it easier for attackers to track the address, especially for data mining purposes. To make it active, assign reservations to use DHCP for IP address assignment and not static IP.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">15. Insecure and exploitable code<\/h5>\n\n\n\n<p>Common flaws in code include injection flaws, cross-site scripting (XSS), buffer overflows, and broken authentication. Strengthening your code involves addressing vulnerabilities with secure coding techniques. Architect code to limit the area of attack for hackers and to identify all types of input and reject all malicious ones. Attack your code often and test the security of your organization\u2019s code architecture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stay safe across your entire IT ecosystem<\/h2>\n\n\n\n<p>To effectively manage the vulnerabilities in your business, establish and maintain full visibility of assets that connect to and relate to your organization, not just the ones you own. Then you can perform automated security testing, using an advanced assessment process to detect a broad range of attack vectors including CVEs, data exposures, and misconfigurations.<\/p>\n\n\n\n<p>To see how CyCognito can detect and prioritize the highest-risk exposures, watch&nbsp;<a href=\"\/resources\/videos\/demo\/\">our demo video<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attack vectors are the path an attacker uses to gain access to your organization\u2019s network. Find out more about the top attack vectors and learn to steer clear of them.<\/p>\n","protected":false},"author":21,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[6,9,11],"class_list":["post-284","post","type-post","status-publish","format-standard","hentry","category-research","tag-attack-surface-management","tag-cybersecurity","tag-discovery"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Attack Vectors and How to Prevent Them | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Attack Vectors and How to Prevent Them | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Attack vectors are the path an attacker uses to gain access to your organization\u2019s network. Find out more about the top attack vectors and learn to steer clear of them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-18T23:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-22T17:00:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png\" \/>\n<meta name=\"author\" content=\"Sam Curcuruto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Curcuruto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/\"},\"author\":{\"name\":\"Sam Curcuruto\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/bcbbd5a2bd8804807d732d4f0bb9348f\"},\"headline\":\"Top Attack Vectors and How to Prevent Them\",\"datePublished\":\"2021-11-18T23:46:00+00:00\",\"dateModified\":\"2024-01-22T17:00:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/\"},\"wordCount\":1467,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png\",\"keywords\":[\"Attack Surface Management\",\"Cybersecurity\",\"Discovery\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/\",\"name\":\"Top Attack Vectors and How to Prevent Them | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png\",\"datePublished\":\"2021-11-18T23:46:00+00:00\",\"dateModified\":\"2024-01-22T17:00:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37.png\",\"width\":1600,\"height\":442},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Attack Vectors and How to Prevent Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/bcbbd5a2bd8804807d732d4f0bb9348f\",\"name\":\"Sam Curcuruto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2829009d340f21cf83edb29498819bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2829009d340f21cf83edb29498819bc?s=96&d=mm&r=g\",\"caption\":\"Sam Curcuruto\"},\"description\":\"Was Sr. Director, Product Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/sam-curcuruto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Attack Vectors and How to Prevent Them | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/","og_locale":"en_US","og_type":"article","og_title":"Top Attack Vectors and How to Prevent Them | CyCognito Blog","og_description":"Attack vectors are the path an attacker uses to gain access to your organization\u2019s network. Find out more about the top attack vectors and learn to steer clear of them.","og_url":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/","og_site_name":"CyCognito Blog","article_published_time":"2021-11-18T23:46:00+00:00","article_modified_time":"2024-01-22T17:00:25+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png","type":"","width":"","height":""}],"author":"Sam Curcuruto","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sam Curcuruto","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/"},"author":{"name":"Sam Curcuruto","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/bcbbd5a2bd8804807d732d4f0bb9348f"},"headline":"Top Attack Vectors and How to Prevent Them","datePublished":"2021-11-18T23:46:00+00:00","dateModified":"2024-01-22T17:00:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/"},"wordCount":1467,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png","keywords":["Attack Surface Management","Cybersecurity","Discovery"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/","url":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/","name":"Top Attack Vectors and How to Prevent Them | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37-1280x354.png","datePublished":"2021-11-18T23:46:00+00:00","dateModified":"2024-01-22T17:00:25+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-37.png","width":1600,"height":442},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/top-attack-vectors-and-how-to-prevent-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top Attack Vectors and How to Prevent Them"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/bcbbd5a2bd8804807d732d4f0bb9348f","name":"Sam Curcuruto","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2829009d340f21cf83edb29498819bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2829009d340f21cf83edb29498819bc?s=96&d=mm&r=g","caption":"Sam Curcuruto"},"description":"Was Sr. Director, Product Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/sam-curcuruto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":689,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/284\/revisions\/689"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}