Day: September 30, 2021

London Tower
Cyber Security

Gaining immunity to privilege escalation

Many cybersecurity attacks these days are characterized by a stealth approach by hackers. The methods of gaining initial admission to a system are well-known. These include zero-day exploits, IT misconfigurations, coding errors and bugs, installation of malware by careless clicks or unauthorized hardware, phishing, social engineering, or brute force cracking of passwords.

Read More »