lateral movement

Threat Actors Targeting Cloud and Managed Service Providers

Written by: Vikram Navali,Senior Technical Product Manager – One year after the SolarWinds supply chain attack, the cyber attackers are charging up with new tricks and campaigns. The threat groups are increasingly targeting unsecured cloud users via cloud solution providers (CSPs). Most start with credential theft, stealing credentials or access keys via phishing attacks and deploying malware that picks up usernames and passwords.

SecuriTIC Latin America Logo

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante

Por Juan Carlos Vázquez, Director para Latinoamérica de Attivo Networks La advertencia ha sido clara y tajante: los ataques de ransomware son cada vez más sofisticados, lo que incrementa su efectividad para causar daños severos a las empresas. Sin embargo, hay detalles que no siempre se esclarecen. ¿En qué consiste la señalada sofisticación? ¿Por qué es …

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante Read More »

eWeek Logo

Cybersecurity Warning: Lateral Movement Tactics Security Experts Should Recognize

Today’s Lateral Movement Tactics: Be Warned Protecting against today’s most dangerous lateral movement tactics is increasingly critical, with AD as vulnerable as it is. Attackers use a wide range of strategies to move about undetected. The list below covers a selection of the most common and potentially damaging tactics. For defenders, knowing what to look …

Cybersecurity Warning: Lateral Movement Tactics Security Experts Should Recognize Read More »

DZone Logo

13 Lateral Movement Tactics Security Experts Should Recognize

One of the most curious elements of this year’s Verizon Data Breach Investigations Report (DBIR) was the inclusion of the new attack pattern “system intrusions.” Representatives from Verizon identified the category as a broad one that tends to include attacks with many steps, indicating significant lateral movement within the network. Research shows that many recent …

13 Lateral Movement Tactics Security Experts Should Recognize Read More »

Hacker Noon Website Logo

Understanding Lateral Movement and How to Detect It

By Carolyn Crandall, chief security advocate, Attivo Networks Lateral movement broadly applies to an attacker’s activity within the network after penetrating perimeter defenses, using various tactics, techniques, and procedures (TTPs). Today’s organizations must understand those TTPs and ensure that their controls are effective across on-premises, remote, and cloud attack surfaces. The MITRE ATT&CK framework plays a beneficial …

Understanding Lateral Movement and How to Detect It Read More »

Help Net Security Logo

Attivo Networks IDEntitleX reduces the attack surface for identities and entitlements in the cloud

Attivo Networks announced a new Cloud Infrastructure Entitlement Management (CIEM) solution, IDEntitleX, designed to deliver visibility and reduce the attack surface for identities and entitlements in the cloud. IDEntitleX expands the company’s leadership position in providing unprecedented visibility and prevention of identity privilege escalation and lateral movement threat activity. With this new product introduction, Attivo becomes …

Attivo Networks IDEntitleX reduces the attack surface for identities and entitlements in the cloud Read More »

Attivo Networks Named to Global CyberTech100 List Two Years in a Row

FREMONT, Calif. – June 8, 2021 – Attivo Networks®, the industry experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced it was named to the Global CyberTech 100 List, which honors the world’s most innovative CyberTech companies that financial institutions should know about when they develop their information security and financial crime-fighting strategies.

Dark Reading

A View From Inside a Deception

“I give up.” Those are the words you’d like any attacker trying to crack into your systems to say. “I never want to go through this again.” Even better. Penetration tester and security content creator Alissa Knight found herself saying those very words recently when pitting herself against the deception technology by threat detection vendor …

A View From Inside a Deception Read More »

intelligent CISO

Expert says CISOs need to take lateral movement seriously

CISOs are faced with the challenge of their enterprise-level environments being vulnerable to lateral movement in their networks. Carolyn Crandall, Chief Security Advocate and CMO at Attivo Networks, says most CISOs are familiar with the role lateral movement plays in attacks, but organisations need to back up this knowledge with action. A thief breaking into …

Expert says CISOs need to take lateral movement seriously Read More »

Scroll to Top