{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigqhskve75jpbvod6n4ds6eejt3ikl5n3fnc5ffluf6xe6gdd5woy",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mmgxhz3qels2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreihqaxexl4pthojnf3gqvbu3evsjh77ey2eafx4k2t7zqmd643c2im"
    },
    "mimeType": "image/webp",
    "size": 69924
  },
  "path": "/vulnerability-exploitation-tops-cyber-breach/",
  "publishedAt": "2026-05-22T10:56:59.000Z",
  "site": "https://thecyberexpress.com",
  "textContent": "\nBeyond vulnerability exploitation, the DBIR identified major changes in social engineering tactics.",
  "title": "Vulnerability Exploitation Overtakes Stolen Credentials in AI-Driven Cyberattacks"
}