Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: privilege escalation

Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes PlatformsA pictorial representation of RBAC-based privilege escalation. Illustrated figures pilot a boat carrying the image of an anchor on a green shield.
9,933
people reacted

Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes Platforms

  • By Yuval Avrahami
  • January 27, 2023 at 6:00 AM

14

9 min. read

Precious Gemstones: The New Generation of Kerberos AttacksAn illustrative example of Kerberos attacks using golden, diamond, or sapphire tickets
48,496
people reacted

Precious Gemstones: The New Generation of Kerberos Attacks

  • By Oz Soprin and Shachar Roitman
  • December 12, 2022 at 6:00 AM

21

14 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web ServerCloud vulnerabilities conceptual image, covering topics such as OpenLiteSpeed vulnerabilities
56,062
people reacted

Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server

  • By Artur Avetisyan
  • November 10, 2022 at 6:00 AM

8

5 min. read

FabricScape: Escaping Service Fabric and Taking Over the ClusterA conceptual image representing container security, including FabricScape, the container escape vulnerability discussed here.
56,863
people reacted

FabricScape: Escaping Service Fabric and Taking Over the Cluster

  • By Aviv Sasson
  • June 28, 2022 at 4:30 PM

38

10 min. read

Why Are My Junctions Not Followed? Exploring Windows Redirection Trust MitigationConceptual illustration showing malicious files
50,700
people reacted

Why Are My Junctions Not Followed? Exploring Windows Redirection Trust Mitigation

  • By Gal De Leon
  • June 14, 2022 at 3:00 PM

20

5 min. read

AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege EscalationA conceptual image representing a vulnerability in the AWS Log4Shell hot patch. It shows a java symbol inside a container with one door open.
68,751
people reacted

AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation

  • By Yuval Avrahami
  • April 19, 2022 at 3:00 PM

65

7 min. read

Network Security Trends: August-October 2021A conceptual image representing network security trends, such as the analysis of network attacks for August-October 2021 provided here.
38,986
people reacted

Network Security Trends: August-October 2021

  • By Yue Guan
  • December 21, 2021 at 12:00 PM

40

10 min. read

Unit 42 Discovers 15 New Vulnerabilities Across Microsoft, Adobe and Apple ProductsConceptual image illustrating vulnerabilities, such as the 15 new vulnerabilities across Microsoft, Adobe and Apple products discussed here.
27,719
people reacted

Unit 42 Discovers 15 New Vulnerabilities Across Microsoft, Adobe and Apple Products

  • By Bo Qu
  • March 19, 2021 at 10:30 AM

27

2 min. read

CVE-2020-14386: Privilege Escalation Vulnerability in the Linux kernelThe image represents the concept of a vulnerability, such as CVE-2020-14386
49,801
people reacted

CVE-2020-14386: Privilege Escalation Vulnerability in the Linux kernel

  • By Or Cohen
  • October 9, 2020 at 5:00 PM

37

8 min. read

Unit 42 Discovers 27 New Vulnerabilities Across Microsoft ProductsThe image illustrates the concept of vulnerabilities, including the 27 new vulnerabilities across Microsoft products discovered by Unit 42 researchers.
22,926
people reacted

Unit 42 Discovers 27 New Vulnerabilities Across Microsoft Products

  • By John Harrison
  • October 2, 2020 at 3:00 PM

16

3 min. read

USBCreator D-Bus Privilege Escalation in Ubuntu Desktop
62,886
people reacted

USBCreator D-Bus Privilege Escalation in Ubuntu Desktop

  • By Nadav Markus
  • July 12, 2019 at 6:00 AM

33

5 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.