TABLE OF CONTENT
The phrase “Trust no one; Verify everyone” is the best fit to describe the cyber world. With data becoming the most valuable asset, the need for organizations to be extra vigilant about their security posture is also increasing. Cyber fraudsters are outpacing organizations with the latest intrusion techniques, bringing up the need for on-time threat detection and proactive threat hunting. In addition, testing security posture and analysing user activity with User Behaviour Analysis are two crucial activities to build a robust security posture. Keeping up the fact that cyber attackers are inevitable, entities must be prepared enough to fight against cyberattacks with high-end SIEM solutions. A robust Security Information and Event Management (SIEM) can monitor security networks 24*7*365, detect suspicious activities, and mitigate threats timely. The case study narrates how an adversary used brute force attempts and started privilege escalation, one of the most infamous techniques used by cyber attackers to perform data breach menace. Privilege escalation involves a malicious user of an account or application attempts to escalate user privileges by intruding into other user account or application. After discussing the privilege escalation attack, the case study unfolds how SISA’s threat hunting team appended User Behaviour Analysis to threat hunting and correlated events to detect and mitigate privilege escalation attack, that could have caused great damage to the organization.
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
