background graphic

Sysdig Site Search

Showing 10 of 292

Detecting MITRE ATT&CK: Privilege escalation with Falco

Blog

The privilege escalation category inside MITRE ATT&CK covers quite a few techniques an adversary can use to escalate privileges inside...

CVE-2018-18264 Privilege escalation through Kubernetes dashboard

Blog

A recently disclosed vulnerability in Kubernetes dashboard (CVE-2018-18264) exposes secrets to unauthenticated users. In this blog post we’ll explore some...

Detecting and mitigating CVE-2021-4034: “Pwnkit” local privilege escalation

Blog

A new advisory from Qualys discloses a local privilege escalation bug in SUID-set program ‘pkexec’. The flaw has been designated...

How to mitigate CVE-2021-33909 Sequoia with Falco – Linux filesystem privilege escalation vulnerability

Blog

The CVE-2021-33909, named Sequoia, is a new privilege escalation vulnerability that affects Linux’s file system. It was disclosed in July,...

CVE-2022-0492: Privilege escalation vulnerability causing container escape

Blog

Linux maintainers disclosed a privilege escalation vulnerability in the Linux Kernel. The vulnerability has been issued a Common Vulnerability and...

Detecting and Mitigating CVE-2023-4911: Local Privilege Escalation Vulnerability

Blog

Recently, Qualys discovered and reported a critical vulnerability affecting the popular GLIBC ecosystem, which is installed by default on most...

CVE-2022-0847: “Dirty Pipe” Linux Local Privilege Escalation

Blog

Right on the heels of CVE-2022-4092, another local privilege escalation flaw in the Linux Kernel was disclosed on Monday, nicknamed...

CSPM – Least privilege principle in practice

Blog

Cloud Security Posture Management (CSPM) aims to automate the identification and remediation of risks across your entire cloud infrastructure. A...

Permissions & Entitlement Management: CIEM

page

Privilege escalation inside MITRE ATT&CK covers several techniques an adversary can use to escalate privileges inside a system.

Introducing Cloud Identity Insights for Sysdig Secure

Blog

In recent years, almost every major cloud breach has been marked by overly permissive credentials, followed by lateral movement and...

1 2 3 30

Stay up to date! Sign up to receive our newsletter.