Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise Methods Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.
BitLocker Vulnerabilities | Lateral Movement Techniques | Windows Security Exploits Cybercriminals have the ability to alter BitLocker registry keys through WMI, enabling them to run harmful code as if they were an interactive user.