background graphic

Sysdig Site Search

Showing 10 of 101

Detecting MITRE ATT&CK: Privilege escalation with Falco

Blog

The privilege escalation category inside MITRE ATT&CK covers quite a few techniques an adversary can use to escalate privileges inside...

CVE-2018-18264 Privilege escalation through Kubernetes dashboard

Blog

A recently disclosed vulnerability in Kubernetes dashboard (CVE-2018-18264) exposes secrets to unauthenticated users. In this blog post we’ll explore some...

Detecting and mitigating CVE-2021-4034: “Pwnkit” local privilege escalation

Blog

A new advisory from Qualys discloses a local privilege escalation bug in SUID-set program ‘pkexec’. The flaw has been designated...

How to mitigate CVE-2021-33909 Sequoia with Falco – Linux filesystem privilege escalation vulnerability

Blog

The CVE-2021-33909, named Sequoia, is a new privilege escalation vulnerability that affects Linux’s file system. It was disclosed in July,...

CVE-2022-0492: Privilege escalation vulnerability causing container escape

Blog

Linux maintainers disclosed a privilege escalation vulnerability in the Linux Kernel. The vulnerability has been issued a Common Vulnerability and...

Detecting and Mitigating CVE-2023-4911: Local Privilege Escalation Vulnerability

Blog

Recently, Qualys discovered and reported a critical vulnerability affecting the popular GLIBC ecosystem, which is installed by default on most...

Protected: Permissions & Entitlement Management: CIEM

page

There is no excerpt because this is a protected post.

CVE-2022-0847: “Dirty Pipe” Linux Local Privilege Escalation

Blog

Right on the heels of CVE-2022-4092, another local privilege escalation flaw in the Linux Kernel was disclosed on Monday, nicknamed...

Permissions & Entitlement Management: CIEM

page

Privilege escalation inside MITRE ATT&CK covers several techniques an adversary can use to escalate privileges inside a system.

How to deal with ransomware on Azure

Blog

Let’s dig deeper into the techniques used by attackers and the mitigations you should implement when ransomware on Azure affects...

1 2 3 11

Stay up to date! Sign up to receive our newsletter.