Term of the Day
Lateral Movement Attack
Lateral movement is a technique that cyber-attackers use to stealthily explore a target network or cloud environment, learn its vulnerabilities and escalate access privileges to reach their target...
Learn More
Techopedia explains Lateral Movement Attack
Lateral movement plays an important role in security breaches, including advanced persistent threats (APTs). In this type of prolonged attack, the perpetrator remains hidden inside the target for an extended period of time, waiting patiently for the right opportunity to escalate the attack.
Security and network monitoring tools will not issue alerts when credentialed entities move laterally across a network or cloud environment because this type of movement appears to be normal behavior. Attackers can remain hidden for years and in some cases, have only been discovered when monitoring tools caught them trying to elevate privileges...
Continue Reading
Techopedia Jobs
Lead Full-Stack Engineer (Java) at Lumen(Remote)
Learn More >>
Full Stack .NET Software Developer at M&T (Wilmington, DE)
Learn More >>
Sr Staff Cyber Security Engineer at GE Avaition (Cincinnati, OH - Remote)
Learn More >>
Follow Techopedia On:
Questions? Contact us today
We are emailing you at [email protected] because you subscribed to receive the Term of the Day through our website.
Our mailing address is:
Finixio, 2023 Tower 42, 25 Old Broad Street, London, EC2N 1HN, United Kingdom
Want to change how you receive these emails?
You can update your preferences or unsubscribe from the Term of the Day
Term of the Day
Lateral Movement Attack
Lateral movement is a technique that cyber-attackers use to stealthily explore a target network or cloud environment, learn its vulnerabilities and escalate access privileges to reach their target...
Learn More
Techopedia explains Lateral Movement Attack
Lateral movement plays an important role in security breaches, including advanced persistent threats (APTs). In this type of prolonged attack, the perpetrator remains hidden inside the target for an extended period of time, waiting patiently for the right opportunity to escalate the attack.
Security and network monitoring tools will not issue alerts when credentialed entities move laterally across a network or cloud environment because this type of movement appears to be normal behavior. Attackers can remain hidden for years and in some cases, have only been discovered when monitoring tools caught them trying to elevate privileges...
Continue Reading
Techopedia Jobs
Lead Full-Stack Engineer (Java) at Lumen(Remote)
Learn More >>
Full Stack .NET Software Developer at M&T (Wilmington, DE)
Learn More >>
Sr Staff Cyber Security Engineer at GE Avaition (Cincinnati, OH - Remote)
Learn More >>
Follow Techopedia On:
Questions? Contact us today
We are emailing you at [email protected] because you subscribed to receive the Term of the Day through our website.
Our mailing address is:
Finixio, 2023 Tower 42, 25 Old Broad Street, London, EC2N 1HN, United Kingdom
Want to change how you receive these emails?
You can update your preferences or unsubscribe from the Term of the Day