By Maya Levine, Technical Marketing Engineer, and Lior Sonntag, Security Analyst A sign of a truly sophisticated attack in the cloud is the ability to move laterally undetected. Doing so successfully requires knowledge of many techniques. In this latest installation of the Cloud Threat Hunting: Attack and Investigation Series, we present the most involved attack…
The post Cloud Threat Hunting: Attack & Investigation Series- Lateral Movement – Under the Radar appeared first on Check Point Software.
Go to Source of this post
Author Of this post: Grace McDougal