For the first time in 19 years, exploiting vulnerabilities has become the primary entry point for data breaches, surpassing stolen login credentials.