Cyberstats

Security Intelligence

TopicsVendorsBlogSearchGet fresh stats weekly
Home›Topics›Lateral movement

Lateral movement

Cybersecurity statistics about lateral movement

Top Vendors

DirectDefense2Gurucul1Orca Security1Gigamon1Trustwave1

Showing 1-6 of 6 results

67% of security leaders lack visibility into access behaviour and lateral movement.

Gurucul•8/21/2025•
Access behavior

76% of organizations have at least one public-facing asset that enables lateral movement.

Orca Security•6/5/2025•
Cloud

47% say that a challenge in securing and managing hybrid cloud is the lack of comprehensive insight and visibility across their environments, including lateral movement in East-West traffic.

Gigamon•5/21/2025•
CloudHybrid cloud

DirectDefense mapped alerts to the MITRE ATT&CK® framework to identify the top five tactics. The top five tactics identified are: Initial Access, Persistence, Lateral Movement, Execution, and Credential Access.

DirectDefense•4/15/2025•
MITRE ATT&CKInitial access

For Lateral Movement, the most observed technique by DirectDefense is Valid Accounts, using stolen credentials to escalate privileges. Alerts triggered for Lateral Movement include: Lateral Movement – Local Credentials.

DirectDefense•4/15/2025•
MITRE ATT&CKValid accounts

96% of attackers targeting energy and utilities sector relied on remote services to move laterally.

Trustwave•1/1/2025•
EnergyUtilities
Cyberstats

Fresh, direct cybersecurity statistics, trends and market data. No fluff.

Get Started

Sign Up Free

Join 1,000+ security professionals

Stay Updated

Get weekly cybersecurity insights

© 2025 Cyberstats. All rights reserved.

Privacy PolicyTerms of ServiceSitemap