Smooth criminals talking their way into cloud environments, Google says

Voice phishing is second most common initial access method across all IR probes, and top in cloud break-ins

Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims’ IT estate – and the No. 1 tactic used when breaking into cloud environments.…

This article has been indexed from The Register – Security

Read the original article: