
How To Detect Privilege Escalation: An Attack Simulation
Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for their level of access – is graduating to the question, “How do I detect privilege escalation in my ... Read More

Log4j 2 – Beyond Patching: What’s Next?
As many infosec practitioners are well aware by now, a critical vulnerability (CVE-2021- 44228) was disclosed late last week on […] The post Log4j 2 - Beyond Patching: What's Next? appeared first on Sonrai Security ... Read More