AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Lateral Movement in Cyber Attacks
This chapter explores the crucial role of lateral movement in the attack lifecycle of cyber threat actors, emphasizing that initial access isn’t sufficient for their goals. It discusses various tools and techniques used for unauthorized movement within networks, as well as the importance of robust security measures like network segmentation. The chapter also highlights vulnerabilities in organizations that can be exploited by attackers, particularly focusing on endpoint security deficiencies.