A hacker can escalate privileges in a domain in many ways, and learning how they work is half the battle in reducing your attack surface. In this post, we’ll go through five ways that a non-privileged user (from now on only called “user”) can utilize to own your network and how you can protect yourself.
Graph databases are a special kind of database storing complex data structures that would be infeasible to store in a traditional relational database. They’re most notably used for social networks, as they’re much more performant for certain queries.
AWS Lambda functions are a way to run code without provisioning or managing your own servers. Rather than running an always-online application, they run a single function in the cloud, which can be triggered in response to API events or other events in your AWS account.