Netcrook Logo
🗓️ 08 Jan 2026  
In cybersecurity, 'pivoting' refers to the technique attackers use to move from one compromised system to others within the same network. After gaining initial access, attackers leverage the compromised machine as a launch point to explore and exploit additional systems, often escalating their privileges and expanding their control. This lateral movement allows them to access sensitive data, install malware, or further entrench themselves within the network, making detection and removal more difficult. Pivoting is a key tactic in advanced persistent threats (APTs) and is a major concern for network defenders, who must monitor for unusual internal activity to detect such movements.
← Back to news