<p>Custom malware and zero-day exploits are dangerous, but attackers are finding that they don't necessarily have to turn to advanced techniques to carry out targeted attack campaigns, according to an analysis conducted by IBM's X-Force research team.</p><p>Rather than costly zero-day attacks that use custom malware to target previously unknown vulnerabilities, attackers use more cost-effective hacking techniques to gain access to corporate systems. Common attacks, such as SQL injection and cross-site scripting, continue to be popular techniques used in advanced persistent threats, IBM said. They're having success targeting flaws in commonly used applications, such as Adobe Flash and Java.</p><p>In its new 2013 Mid-year Trend and Risk Report, an IBM analysis of threats in the first half of the year found attackers having great success using operational sophistication to breach targets. Basic security hygiene is not upheld in organizations, IBM said. Companies are struggling with a commitment to apply basic security fundamentals.</p><p>[Related: 5 Dangerous Web Application Flaws Coveted By Attackers]</p><p><a href="http://www.crn.com/news/security/240161761/ibms-x-force-team-attackers-take-path-of-least-resistance.htm">Keep reading...</a></p><p>Read also:</p><p><a href="http://www.cso.com.au/article/527454/social_media_mobile_phones_top_attack_targets/">Social media, mobile phones top attack targets</a> (CSO Magazine)</p><p><a href="http://www.cbronline.com/news/security/cisos-need-to-update-knowledge-to-keep-up-with-mobile-social-networking-threat-250913">CISOs need to update knowledge to keep up with mobile, social networking threat</a> (Computer Business Review)</p><p>Explore: <a href="http://news.google.com/news/more?ncl=dNR0Ph6Kd5D18uMk3i4Oy7cSo1PkM&ned=us">4 additional articles.</a></p>