a technique where attackers leverage one compromised machine to reach others.
Last updated 1 month ago