Attivo Networks Blogs

lateral movement Tag

Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement

Reading Time: 2 minutes  |  Published: March 9, 2021 in Active Directory, Blogs, Cloud, Endpoint Protection, Event, ThreatPath
0 Comments

Written by the Attivo Research Team - Contributing members: Gorang Joshi, Anil Gupta, Saravanan Mohan - Microsoft and Volexity have confirmed the active exploitation of vulnerabilities published by Microsoft in Exchange Server. Security research has attributed the exploitation to the Advanced Persistent Threat group known as Hafnium...

Defense in Depth – Filling the Gaps to Detect and Stop Lateral Movement

Reading Time: < 1 minute  |  Published: February 25, 2021 in
0 Comments

During the SolarWinds breach, attackers had a back door into potentially thousands of networks. Typical security controls focus on detecting the initial compromise but seldom the lateral movement and privilege escalation activities that attackers spend most of their time executing. Join us for a discussion where...

Detecting Lateral Movement

Preventing Lateral Movement

Reading Time: 3 minutes  |  Published: January 6, 2021 in Blogs, Lateral Movement
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - All it takes is one compromised system to start a cyberattack. Once attackers get a foothold inside the network, they can gather information or escalate privileges to complete their mission. After gaining initial access, attackers use lateral...

The SolarWinds Attack: How to Address Lateral Movement On-Demand Webinar

Reading Time: < 1 minute  |  Published: January 1, 2021 in
0 Comments

Joseph Salazar, Technical Marketing Manager | Attivo Networks 22 mins The SolarWinds supply chain breach garnered much attention and concern, especially for potentially vulnerable organizations. While the compromise method was novel, analysis indicates that the attackers used typical in-network attack activities, such as credential theft, privilege escalation,...

Attivo Offers Limited-Time Software Use to Combat Privilege Escalation and Lateral Movement

Reading Time: 2 minutes  |  Published: December 22, 2020 in Active Directory, Blogs, ThreatDefend
0 Comments

Author: Tushar Kothari, CEO – If anyone had any doubts about whether the attackers are already inside your networks, then the last week’s events indicate that you must expect that attackers already came in through various back doors. Some notable highlights from industry and government also...

SolarWinds Supply Chain Attack: Automating Incident Response to Detect Lateral Movement

Reading Time: 4 minutes  |  Published: December 15, 2020 in Blogs, Cyber Breach, Uncategorized
0 Comments

Author: Attivo Research Team - SolarWinds issued an advisory on 13 December 2020 informing users of a sophisticated attack on its Orion Platform, an application that monitors and manages IT environments. FireEye analyzed the SolarWinds Orion Platform code compromise (dubbed SUNBURST) and shared further post-analysis details...

Why 2021 will be a big year for deception technology

Reading Time: < 1 minute  |  Published: December 14, 2020 in Attivo News
0 Comments

New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration. Ask any cybersecurity professional to define deception technology and they’ll likely talk about honeypots or honeynets. This is accurate but antiquated, as is the misconception that deception technology is complex, has...

Why data concealment is essential in fighting cyber-attacks

Reading Time: < 1 minute  |  Published: December 10, 2020 in Attivo News
0 Comments

While there is no silver bullet in cybersecurity, concealing your organisation's most high-value targets could the intruder from escalating their attacks, says Ray Kafity, vice president for Middle East Turkey and Africa (META), Attivo Networks. Read the complete article by Ray Kafity in ITP.net....