{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigqhskve75jpbvod6n4ds6eejt3ikl5n3fnc5ffluf6xe6gdd5woy",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mmgxhz3qels2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreihqaxexl4pthojnf3gqvbu3evsjh77ey2eafx4k2t7zqmd643c2im"
},
"mimeType": "image/webp",
"size": 69924
},
"path": "/vulnerability-exploitation-tops-cyber-breach/",
"publishedAt": "2026-05-22T10:56:59.000Z",
"site": "https://thecyberexpress.com",
"textContent": "\nBeyond vulnerability exploitation, the DBIR identified major changes in social engineering tactics.",
"title": "Vulnerability Exploitation Overtakes Stolen Credentials in AI-Driven Cyberattacks"
}