By Maya Levine, Technical Marketing Engineer, and Lior Sonntag, Security Analyst A sign of a truly sophisticated attack in the cloud is the ability to move laterally undetected. Doing so successfully requires knowledge of many techniques. In this latest installation of the Cloud Threat Hunting: Attack and Investigation Series, we present the most involved attack…

The post Cloud Threat Hunting: Attack & Investigation Series- Lateral Movement – Under the Radar appeared first on Check Point Software.

By admin