Lateral Movement in the Real World: A Quantitative Analysis
Cyber-attacks usually start with a single compromised endpoint. But the attacker then usually moves upward to higher levels of access.
A newer trend in cyber-attacks is lateral attacks. These attacks don't move upward but outward to gain access to a wide range of hosts, user accounts and applications. These types of attacks can be exceedingly difficult to spot as they move inside your system, often using trusted utilities that aren't scanned by security tools. This article from the VMware Security Blog explains how lateral attacks work and how to spot them. Read the article here:
Comments
Post a Comment