Linux Privilege Escalation: Dirty Pipe

March 14, 2022
Linux Privilege Escalation: Dirty Pipe

Linux is not having a great year when it comes to privilege escalation vulnerabilities. Let’s see how the latest privilege escalation vulnerability works on Linux, and how it can be exploited!

Related Resources

Predicting Malicious Network Connections Using Splunk and AI

See how Splunk can be used to predict malicious network connections using artificial intelligence and machine learning!

Splunk and AI, Part 2 – Threat Hunting on Domain Controllers Using Deep Learning

See how machine learning and artificial intelligence can be used within Splunk to find anomalies on domain controllers

Splunk and AI, Part 1- Automating Threat Hunting With Artificial Intelligence

See how artificial intelligence can be used within Splunk to bring possible security anomalies to light.