![]() While other posts concentrate on the malware itself we’ll focus on the database side of the attack, the dangerous functions, and the power that is stored inside the SQL Server. You’ll learn more about the methods and techniques cyber criminals are using today to deploy malware, gain persistence, take over the system to join the server into massive botnets, and escalate privileges in order to get access to an organization’s network. You’ll notice that the attack landscape has not changed much in the past 3 years. ![]() To see those findings, check out “ A Deep Dive into Database Attacks ”. ![]() This is a follow-up on previous Imperva Research Labs research done in 2018 on SQL Server. Here we’ll provide a glimpse into today’s “Database Attack Landscape”. This approach is very effective because it allows us to analyze different attack scenarios and gain actionable insights about the methods and techniques that hackers use to attack databases. One routine approach that security practitioners employ to protect databases is deploying honeypots and waiting for bad actors to take the bait. In this blog, we will take a closer look at database security on SQL Server. At the Imperva Research Labs we have the chance to scrutinize various security situations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |