
Episode 107: How To Defend Against Lateral Movement
The Cyber Threat Perspective
Exploring Credential Gathering Tactics and Vulnerabilities
This chapter explores the methods used by threat actors for credential gathering, including password spraying and share spelunking. It highlights the vulnerabilities of both traditional file shares and modern platforms like SharePoint and Slack, emphasizing the dangers of poor credential management.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.