privilege escalation

How To Detect Privilege Escalation: An Attack Simulation

Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for their level of access – is graduating to the question, “How do I detect privilege escalation in my ... Read More
Learn more about Log4j vulnerabilities and how you can prevent this issue from ever happening in your AWS, Azure, and GCP environment

Log4j 2 – Beyond Patching: What’s Next?

As many infosec practitioners are well aware by now, a critical vulnerability (CVE-2021- 44228) was disclosed late last week on […] The post Log4j 2 - Beyond Patching: What's Next? appeared first on Sonrai Security ... Read More