DiscoverCuriosophy: A Future Forward Cast.Shadow Paths: Inside Network Attack Patterns
Shadow Paths: Inside Network Attack Patterns

Shadow Paths: Inside Network Attack Patterns

Update: 2025-01-17
Share

Description

Description: Uncover the critical world of network security in our technical series exploring lateral movement attack patterns. Each episode dissects how attackers navigate compromised networks, examining legitimate system tools that become weapons and essential defense strategies against network infiltration. Join security experts as they analyze real attack scenarios, pivoting techniques, and practical mitigation strategies from the MITRE ATT&CK® framework. Essential listening for cybersecurity professionals, network administrators, and security architects seeking to protect their infrastructure from sophisticated lateral movement attacks.

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Shadow Paths: Inside Network Attack Patterns

Shadow Paths: Inside Network Attack Patterns

Future Center Ventures, Mark M. Whelan