annam

How to Monitor Lateral Movement with NetFlow

During our incident response training conducted all over the world, we work with security professionals to identify various trends related to how malicious actors persist and move within a compromised organization. Once the patient zero has been compromised, the malware typically proceeds with credential harvesting, internal reconnaissance, and attacking other internal systems to spread further …

How to Monitor Lateral Movement with NetFlow Read More »