Indirect Misuse of Privilege and a Response to Adobe Vulnerability

BeyondTrust, October 27th, 2010

If you didn’t notice from my previous post on Google’s breach, I’m on a mission to demonstrate that almost every major breach or vulnerability is tied to administrative privileges. The truth is, whether it’s malware, hackers or a vulnerability, chances are it’s very difficult for anyone to deal serious damage without admin rights.

So when I read the