A new study of over a half-million malware samples collected from various sources in 2022 revealed that attackers put a high value on lateral movement, incorporating more techniques that would allow them to spread through corporate networks. Several of the most prevalent tactics, as defined by the MITRE ATT&CK framework, that were identified in the dataset aid lateral movement, including three new ones that rose into the top 10.
“An increase in the prevalence of techniques being performed to conduct lateral movement highlights the importance of enhancing threat prevention and detection both at the security perimeter as well as inside networks,” researchers from cybersecurity firm Picus, said in their report.
More Stories
Friday Squid Blogging: Giant Squid vs. Blue Marlin
Epic matchup. As usual, you can also use this squid post to talk about the security stories in the news...
German Police Raid DDoS-Friendly Host ‘FlyHosting’
Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...
Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
GPDP probe is due to allegations that ChatGPT failed to comply with data collection rules Read More
Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
Harvesting API keys and secrets from AWS SES, Microsoft Office 365 and other services Read More
New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
The cross-site scripting flaw affects SFX version 9.1.1436.9590 or earlier and has a CVSS of 8.2 Read More