The Cyber Threat Perspective cover image

Episode 107: How To Defend Against Lateral Movement

The Cyber Threat Perspective

CHAPTER

Exploring Credential Gathering Tactics and Vulnerabilities

This chapter explores the methods used by threat actors for credential gathering, including password spraying and share spelunking. It highlights the vulnerabilities of both traditional file shares and modern platforms like SharePoint and Slack, emphasizing the dangers of poor credential management.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner