Attackers Continue to Focus on Users, Well-Worn Techniques