Back

Lateral Movement: How Attackers Expand Access After Initial Compromise

Lateral movement turns a single compromise into an enterprise-wide breach. Learn how attackers spread, why it evades detection, and how CISOs can contain it.

Minutes to listen:
by Dune Research Team
03 Sep 2025
8 min read
September 3, 2025

FAQs

Complete the form below to get started.

What is lateral movement in cybersecurity?
How quickly can attackers begin lateral movement?
What are examples of lateral movement techniques?
Why is lateral movement so hard to detect?
What makes lateral movement so dangerous?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all

Transforming Cybersecurity Awareness Training

Dune Security CTO Michael Waite joins Security by Default to break down how AI-boosted social engineering and identity-based deception are transforming enterprise user risk.

Featured Podcasts

Five Cybersecurity Myths Enterprises Must Leave Behind in 2025

This year’s threat patterns exposed five major misconceptions about user risk that every enterprise should retire before 2026.

Blog
Employee sitting at home in front of a Christmas tree, holding a smartphone and credit card while reviewing an online payment, representing how holiday shopping scams and credit card fraud can spill over into the workplace and put company data at risk.

Holiday Scams Are Surging. Here Are the Top Threats Facing Your Workforce.

Discover the top holiday scams affecting employees and how organizations can stay secure during the busiest season of the year.

Blog

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.