Lateral Movement
Techniques attackers use to move through a network after initial compromise, seeking additional systems to control and data to steal.
Techniques attackers use to move through a network after initial compromise, seeking additional systems to control and data to steal.