Chinese hackers breach office that reviews foreign investments in US

This other breach shows growing sophistication and reach of state-sponsored cyberattacks. Such incidents emphasize the need for robust cybersecurity measures, particularly for government agencies handling sensitive economic and national security information.
how does it happened seriously.
 
i am talking from the angle , The US have very strong defensive team.
I understand your point, and the U.S. does indeed have a strong defensive team. Their ability to adapt and respond quickly to challenges sets them apart. However, it’s also worth considering that end users within the systems are not cybersecurity experts which of course is another weak point-social engineering or hackers might find a clever way of exploiting vulnerabilities in the system
 
  • Love
Reactions: Trevor Chandler
I understand your point, and the U.S. does indeed have a strong defensive team. Their ability to adapt and respond quickly to challenges sets them apart. However, it’s also worth considering that end users within the systems are not cybersecurity experts which of course is another weak point-social engineering or hackers might find a clever way of exploiting vulnerabilities in the system
Do they use piggybacking or phishing method to execute their plan.
 
Do they use piggybacking or phishing method to execute their plan.
Yes, both piggybacking and phishing are common methods hackers use, along with other tactics like pretexting, baiting, and spear phishing, to exploit human vulnerabilities and gain unauthorized access...

CompTIA Security plus SY0-701
2.2 Explain common threat vectors and attack surfaces.
 
  • Love
Reactions: Trevor Chandler
Yes, both piggybacking and phishing are common methods hackers use, along with other tactics like pretexting, baiting, and spear phishing, to exploit human vulnerabilities and gain unauthorized access...

CompTIA Security plus SY0-701
2.2 Explain common threat vectors and attack surfaces.
If you want to know if any particular concept is covered in any CompTIA course, CIN is the place to come - precious has your answer!!!!
 
  • Haha
Reactions: precious