Information Security Buzz Features: Cybereason Findings on Privilege Escalation Detection
Written By
Lital Asher-Dotan
Cybereason Lab recently found that common forensics tool fail to correctly capture privilege escalation by attackers. This finding was featured in Information Security Buzz. This is an important findings as escalation of privileges is an early step taken by an attacker early after penetrating the network in 8 out of 10 hacking operations. It allows the attacker to gain control over the user's machine and enables his lateral movement in the network. Read the full report here:
Cybereason was developed to detect hackers activities in the network post-breach. It detects privileges escalation as well as other malicious activities that other systems fail to detect. Watch our demo to see how Cybereason detects an attacker escalating privileges in real time:
Share
About the Author
Lital Asher-Dotan
Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.
The Cybereason Security Services Team is investigating incidents that involve variants of the DJvu ransomware delivered via loader payloads masquerading as freeware or cracked software.
Consider how much time your business would allow you for an ALLOW or BLOCK decision in the event of a ransomware attack, and then challenge your team to determine if they have the processes and the skills to achieve it...
The Cybereason Security Services Team is investigating incidents that involve variants of the DJvu ransomware delivered via loader payloads masquerading as freeware or cracked software.
Consider how much time your business would allow you for an ALLOW or BLOCK decision in the event of a ransomware attack, and then challenge your team to determine if they have the processes and the skills to achieve it...
Want to see the Cybereason Defense Platform in action?Schedule a Demo