• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
Investigate East-West Attacks on Critical Assets with Network Traffic Analysis

Investigate East-West Attacks on Critical Assets with Network Traffic Analysis

Extrahop
Published by: Research Desk Released: Sep 16, 2019

Today, an attacker’s goals are focused on data access and exfiltration. To gain entry into an environment, sophisticated attackers aggressively pursue and compromise specific targets, often using social engineering tactics such as spearphishing. This attack activity is described by the Lockheed Martin Cyber Kill Chain1 and is focused on initial reconnaissance and weaponization to exploit and control a device.