
Sign up to save your podcasts
Or


These sources collectively address the significant cybersecurity challenge of lateral movement, where attackers navigate compromised networks to reach valuable assets. TechTarget and CERT-EU offer technical insights into common techniques like Pass-the-Hash and Pass-the-Ticket, detailing detection methods within Windows environments using event logs. Bleeping Computer and Medium explain how these attacks work, emphasizing the role of compromised credentials and outlining preventative measures such as strong password policies and multi-factor authentication. CrowdStrike discusses "Living off the Land" tactics that utilize legitimate system tools for lateral movement and advocates for proactive detection strategies. Finally, a Reddit discussion highlights the persistent difficulty in detecting lateral movement despite advanced security tools and suggests approaches like improved baselining and network segmentation, while Palo Alto Networks promotes the principle of least privilege as a fundamental defense against such threats by limiting user access.
Patreon Support:
https://www.patreon.com/DecodedPodcast
By Edward Henriquez4.8
44 ratings
These sources collectively address the significant cybersecurity challenge of lateral movement, where attackers navigate compromised networks to reach valuable assets. TechTarget and CERT-EU offer technical insights into common techniques like Pass-the-Hash and Pass-the-Ticket, detailing detection methods within Windows environments using event logs. Bleeping Computer and Medium explain how these attacks work, emphasizing the role of compromised credentials and outlining preventative measures such as strong password policies and multi-factor authentication. CrowdStrike discusses "Living off the Land" tactics that utilize legitimate system tools for lateral movement and advocates for proactive detection strategies. Finally, a Reddit discussion highlights the persistent difficulty in detecting lateral movement despite advanced security tools and suggests approaches like improved baselining and network segmentation, while Palo Alto Networks promotes the principle of least privilege as a fundamental defense against such threats by limiting user access.
Patreon Support:
https://www.patreon.com/DecodedPodcast

56,420 Listeners

8,001 Listeners

175 Listeners

134 Listeners

25 Listeners