open.spotify.com/episode/2Dd16RTy485VPedpThIDqi
Preview meta tags from the open.spotify.com website.
Linked Hostnames
1Thumbnail
Search Engine Appearance
(Replay) How To Defend Against Lateral Movement
Listen to this episode from The Cyber Threat Perspective on Spotify. In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strategies to restrict it, such as least privilege access, network segmentation, and monitoring. The podcast emphasizes the importance of understanding lateral movement and implementing comprehensive security measures to mitigate these threats.Resourceshttps://www.reddit.com/r/cybersecurity/comments/1ellylu/what_lateral_attacks_have_you_been_seeing/The DFIR ReportLateral Movement, Tactic TA0008 - Enterprise | MITRE ATT&CK®Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpovSpencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessiWork with Us: https://securit360.comBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/mylinks Work with Us: https://securit360.com
Bing
(Replay) How To Defend Against Lateral Movement
Listen to this episode from The Cyber Threat Perspective on Spotify. In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strategies to restrict it, such as least privilege access, network segmentation, and monitoring. The podcast emphasizes the importance of understanding lateral movement and implementing comprehensive security measures to mitigate these threats.Resourceshttps://www.reddit.com/r/cybersecurity/comments/1ellylu/what_lateral_attacks_have_you_been_seeing/The DFIR ReportLateral Movement, Tactic TA0008 - Enterprise | MITRE ATT&CK®Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpovSpencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessiWork with Us: https://securit360.comBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/mylinks Work with Us: https://securit360.com
DuckDuckGo
(Replay) How To Defend Against Lateral Movement
Listen to this episode from The Cyber Threat Perspective on Spotify. In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strategies to restrict it, such as least privilege access, network segmentation, and monitoring. The podcast emphasizes the importance of understanding lateral movement and implementing comprehensive security measures to mitigate these threats.Resourceshttps://www.reddit.com/r/cybersecurity/comments/1ellylu/what_lateral_attacks_have_you_been_seeing/The DFIR ReportLateral Movement, Tactic TA0008 - Enterprise | MITRE ATT&CK®Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpovSpencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessiWork with Us: https://securit360.comBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/mylinks Work with Us: https://securit360.com
General Meta Tags
15- title(Replay) How To Defend Against Lateral Movement - The Cyber Threat Perspective | Podcast on Spotify
- charsetutf-8
- X-UA-CompatibleIE=9
- viewportwidth=device-width, initial-scale=1
- fb:app_id174829003346
Open Graph Meta Tags
179- og:site_nameSpotify
- og:title(Replay) How To Defend Against Lateral Movement
- og:descriptionThe Cyber Threat Perspective · Episode
- og:urlhttps://open.spotify.com/episode/2Dd16RTy485VPedpThIDqi
- og:typemusic.song
Twitter Meta Tags
5- twitter:site@spotify
- twitter:title(Replay) How To Defend Against Lateral Movement
- twitter:descriptionThe Cyber Threat Perspective · Episode
- twitter:imagehttps://i.scdn.co/image/ab6765630000ba8a62c17c086b9d4516ca45a36b
- twitter:cardsummary
Link Tags
31- alternatehttps://open.spotify.com/oembed?url=https%3A%2F%2Fopen.spotify.com%2Fepisode%2F2Dd16RTy485VPedpThIDqi
- alternateandroid-app://com.spotify.music/spotify/episode/2Dd16RTy485VPedpThIDqi
- canonicalhttps://open.spotify.com/episode/2Dd16RTy485VPedpThIDqi
- iconhttps://open.spotifycdn.com/cdn/images/favicon32.b64ecc03.png
- iconhttps://open.spotifycdn.com/cdn/images/favicon16.1c487bff.png
Website Locales
2en
https://open.spotify.com/episode/2Dd16RTy485VPedpThIDqix-default
https://open.spotify.com/episode/2Dd16RTy485VPedpThIDqi
Links
9- https://open.spotify.com
- https://open.spotify.com/episode/01O4nbox8KtNqPYK3OhRCv
- https://open.spotify.com/episode/1GnTohbtNEuMg9VCUZnpCC
- https://open.spotify.com/episode/1e50QZqfXjR8CnNsKX5jxH
- https://open.spotify.com/episode/2iTj6vR0NnYYR57zjS6hgF