The Cyber Threat Perspective cover image

Episode 107: How To Defend Against Lateral Movement

The Cyber Threat Perspective

00:00

Exploring Credential Gathering Tactics and Vulnerabilities

This chapter explores the methods used by threat actors for credential gathering, including password spraying and share spelunking. It highlights the vulnerabilities of both traditional file shares and modern platforms like SharePoint and Slack, emphasizing the dangers of poor credential management.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app