NEW LATERAL MOVEMENT TECHNIQUES ABUSE DCOM TECHNOLOGY
Cybereason researchers discovered new lateral movement methods that abuse the DCOM functionality of Windows applications.
Read MoreFind more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.
Featured
See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
Watch NowCybereason researchers discovered new lateral movement methods that abuse the DCOM functionality of Windows applications.
Read MoreCompromised Web application servers have been a security issue since the dawn of the Internet but many security solutions don't detect this threat.
Read More