a technique where attackers leverage one compromised machine to reach others.
Last updated 2 days ago