See how Splunk can be used to predict malicious network connections using artificial intelligence and machine learning!
Linux Privilege Escalation: Polkit pkexec Pwnkit – CVE-2021-4034
January 31, 2022
Privilege escalation on any operating system tends to be quite situational. However, the latest privilege escalation exploit on Linux appears to be a game changer in terms of gaining root access on Linux systems. Let’s see how it works: