Nice article! Can‘t agree more on all of them amd seen many of them in the wild:
📄 Default configurations of software and applications
⛔️ Improper separation of user/administrator privilege
🔎 Insufficient internal network monitoring
⚠️ Lack of network segmentation
🔄 Poor patch management
🔀 Bypass of system access controls
📱 Weak or misconfigured MFA methods
🎣 Lack of phishing-resistant MFA
🚫 Insufficient access control lists on network shares and services
🧼 Poor credential hygiene
👨🏼💻 Unrestricted Code Execution
#cybersecurity #NetworkAccessControl #patchmanagement #PrincipleOfLeastPriviledge #mfa #phishing #networksegmentation #networkmonitoring #hardening #codeexecution