Reading Time: 7 minutes Every day we see new vulnerabilities being reported that could allow an attacker access to your data, which means it’s time for you to take action. This article looks at some of the privilege escalation types present today, providing examples of possible attack paths against identities and data. We hope you’ll gain a better understanding