With Australian and international authorities calling out lateral movement incidents multiple times this year, itโs clearly an area where improvements are being urgently sought.
A key trend to gain momentum this year was the issuance of multi-country-led advisories outlining the tradecraft of threat groups striking both Australian and allied targets.
Two of these - the living off the land (LOTL) advisory of February, and the analysis of Australian organisations breached by APT40 - dealt with the issue of lateral movement, a post-exploitation activity during which a threat actor tries to compromise adjacent IT systems.
The interest in LOTL techniques was driven by their use by โstate-sponsored APT ...
The Voice of Cyberยฎ
TECHNOLOGY
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the ...
While identity theft is often considered a consumer issue, its impact is being felt more and more by businesses, especially in the wake of major data breaches. In response, ...
With the proportion of daily life conducted online continuing to grow, adopting a decentralised approach to identity management makes increasing sense.
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly ...
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain ...
This article explores AIโs role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP ...
In The News
Sort By
- Date
- Title
While companies improve defenses, almost half of respondents still suffer ransomware attacks and the resulting ransom payments only perpetuate the cycle of vulnerability
Report reaffirms BeyondTrustโs position as a Leader for the fifth consecutive year in the Privileged Access Management (PAM) market
Report highlights Innovation, Market ...
SAN JOSE, Calif., October 10, 2024 โย ColorTokens Inc., the leading enterprise microsegmentation company, announced today that Chuck Suitor has joined its Board of Advisors to ...
Security analysts now have even more LLMs to choose from when using Elastic Securityโs Generative AI features to protect their organisations
Developers benefit from Vertex AIโs fully managed AI development platform when building production-ready RAG applications with Elastic
Developers can now use Elasticsearch to interact with data, run experiments and build applications using models available from Google AI Studio