Platforms Enterprise It SecurityEnterprise Issue

Identity and MFA abuse to become trusted users and move laterally

April 4, 2026Cisco Talos Intelligence Group, Black Hills Information Security

Cisco Talos and Black Hills Information Security emphasize that attackers increasingly target identity systems and MFA workflows, then maintain persistence through privileged access paths, shifting enterprise defense toward identity hardening and monitoring.

When Attackers Become Trusted Users
Targeting identity systems and MFA workflows
Establishing persistent, high-trust access
Using internal phishing to move laterally
Intro to PAMSkeletonKey for Persistence
Cisco Talos Intelligence Group
Black Hills Information Security
identity-securitypersistencelateral-movementmfaprivilege escalationlateral movement

See what experts are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.

← Back to Cyber Security