Security | Vulnerability Scans and AssessmentWhat is Pass the Hash Attack and how to mitigate the attack