Information Security Buzz Features: Cybereason Findings on Privilege Escalation Detection

Cybereason Lab recently found that common forensics tool fail to correctly capture privilege escalation by attackers. This finding was featured in Information Security Buzz. This is an important findings as escalation of privileges is an early step taken by an attacker early after penetrating the network in 8 out of 10 hacking operations. It allows the attacker to gain control over the user's machine and enables his lateral movement in the network. Read the full report here:

 

Cybereason was developed to detect hackers activities in the network post-breach. It detects privileges escalation as well as other malicious activities that other systems fail to detect. Watch our demo to see how Cybereason detects an attacker escalating privileges in real time:

 

 

 

 

 

 

 

 

Lital Asher-Dotan
About the Author

Lital Asher-Dotan

Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.