Back

Lateral Movement: How Attackers Expand Access After Initial Compromise

Lateral movement turns a single compromise into an enterprise-wide breach. Learn how attackers spread, why it evades detection, and how CISOs can contain it.

by Dune Research Team
03 Sep 2025
5 min read

FAQs

Complete the form below to get started.

What is lateral movement in cybersecurity?
How quickly can attackers begin lateral movement?
What are examples of lateral movement techniques?
Why is lateral movement so hard to detect?
What makes lateral movement so dangerous?

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.