
Sign up to save your podcasts
Or


These sources collectively address the significant cybersecurity challenge of lateral movement, where attackers navigate compromised networks to reach valuable assets. TechTarget and CERT-EU offer technical insights into common techniques like Pass-the-Hash and Pass-the-Ticket, detailing detection methods within Windows environments using event logs. Bleeping Computer and Medium explain how these attacks work, emphasizing the role of compromised credentials and outlining preventative measures such as strong password policies and multi-factor authentication. CrowdStrike discusses "Living off the Land" tactics that utilize legitimate system tools for lateral movement and advocates for proactive detection strategies. Finally, a Reddit discussion highlights the persistent difficulty in detecting lateral movement despite advanced security tools and suggests approaches like improved baselining and network segmentation, while Palo Alto Networks promotes the principle of least privilege as a fundamental defense against such threats by limiting user access.
Patreon Support:
https://www.patreon.com/DecodedPodcast
By Edward Henriquez4.8
44 ratings
These sources collectively address the significant cybersecurity challenge of lateral movement, where attackers navigate compromised networks to reach valuable assets. TechTarget and CERT-EU offer technical insights into common techniques like Pass-the-Hash and Pass-the-Ticket, detailing detection methods within Windows environments using event logs. Bleeping Computer and Medium explain how these attacks work, emphasizing the role of compromised credentials and outlining preventative measures such as strong password policies and multi-factor authentication. CrowdStrike discusses "Living off the Land" tactics that utilize legitimate system tools for lateral movement and advocates for proactive detection strategies. Finally, a Reddit discussion highlights the persistent difficulty in detecting lateral movement despite advanced security tools and suggests approaches like improved baselining and network segmentation, while Palo Alto Networks promotes the principle of least privilege as a fundamental defense against such threats by limiting user access.
Patreon Support:
https://www.patreon.com/DecodedPodcast

369,072 Listeners

189 Listeners

138 Listeners

32 Listeners