Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise MethodsĀ Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.
BitLocker Vulnerabilities | Lateral Movement Techniques Cybercriminals have the ability to alter BitLocker registry keys through WMI, enabling them to run harmful code as if they were an interactive user.