IBM X-Force: Hackers recycle previously stolen data to get into networks


Cybercriminals are not only sticking with traditional methods, such as phishing and exploitation of vulnerabilities, they are also recycling previously stolen credentials in hacking their way to an organization’s network, according to the latest IBM X-Force Threat Intelligence Index 2020 report.

Click here to view original webpage at


Your e-mail address will not be published.
Required fields are marked*