Exploiting vulnerabilities has become the most common method for access than other attack vectors.