
Sign up to save your podcasts
Or
These sources collectively address the significant cybersecurity challenge of lateral movement, where attackers navigate compromised networks to reach valuable assets. TechTarget and CERT-EU offer technical insights into common techniques like Pass-the-Hash and Pass-the-Ticket, detailing detection methods within Windows environments using event logs. Bleeping Computer and Medium explain how these attacks work, emphasizing the role of compromised credentials and outlining preventative measures such as strong password policies and multi-factor authentication. CrowdStrike discusses "Living off the Land" tactics that utilize legitimate system tools for lateral movement and advocates for proactive detection strategies. Finally, a Reddit discussion highlights the persistent difficulty in detecting lateral movement despite advanced security tools and suggests approaches like improved baselining and network segmentation, while Palo Alto Networks promotes the principle of least privilege as a fundamental defense against such threats by limiting user access.
Patreon Support:
https://www.patreon.com/DecodedPodcast
4.8
44 ratings
These sources collectively address the significant cybersecurity challenge of lateral movement, where attackers navigate compromised networks to reach valuable assets. TechTarget and CERT-EU offer technical insights into common techniques like Pass-the-Hash and Pass-the-Ticket, detailing detection methods within Windows environments using event logs. Bleeping Computer and Medium explain how these attacks work, emphasizing the role of compromised credentials and outlining preventative measures such as strong password policies and multi-factor authentication. CrowdStrike discusses "Living off the Land" tactics that utilize legitimate system tools for lateral movement and advocates for proactive detection strategies. Finally, a Reddit discussion highlights the persistent difficulty in detecting lateral movement despite advanced security tools and suggests approaches like improved baselining and network segmentation, while Palo Alto Networks promotes the principle of least privilege as a fundamental defense against such threats by limiting user access.
Patreon Support:
https://www.patreon.com/DecodedPodcast
1,072 Listeners
163 Listeners
1,018 Listeners
137 Listeners
405 Listeners
7,951 Listeners
129 Listeners
13 Listeners
30 Listeners
513 Listeners
18 Listeners
0 Listeners