The result of techniques that provide an attacker with higher permissions on a system or network
Last updated 4 months ago