Carbon Black’s Erika Noerenberg, who submitted a privilege escalation technique to MITRE ATT&CK earlier this year, highlights the user interaction required to elevate access on macOS systems, using the Shlayer malware as an illustrative example.
Red Canary’s Cathy Cramer explains that because Linux systems are typically servers instead of desktop devices, they are less susceptible to the most vulnerable layer of security: users. Fewer applications means less surface area; thus, adversaries are more likely to seek out different ways to escalate privileges on Linux machines.
In this concluding clip, our panelists weigh in on the risk that privilege escalation poses to enterprise environments, citing the NotPetya ransomware outbreak of 2018 that is estimated to have cost a handful of companies $10B globally. Audience questions lead to an enlightening discussion on the roles that developers and individual users play as gatekeepers of security.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.