🛡️ Security

Lateral Movement

Techniques attackers use to move through a network after initial compromise, seeking additional systems to control and data to steal.