Database Ransomware: From Attack to Recovery

Database Ransomware: From Attack to Recovery

Introduction In recent years, ransomware attacks have risen sharply, due to their profitability, ease of access with ransomware-as-a-service (RaaS) tools, and an increasing attack surface.  Ransomware is a type of attack in ...

Major Database Security Threats & How You Can Prevent Them

Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...
API Security 101: Security Misconfiguration

API Security 101: Security Misconfiguration

An overview of the most common security misconfigurations, a constant threat against API implementations.Photo by Anne Nygård on UnsplashYou’ve probably heard of the OWASP top ten or the top ten vulnerabilities that threaten ...

Ghidra 101: Loading Windows Symbols (PDB files)

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time ...

10 Database Security Best Practices You Should Know

According to Risk Based Security’s 2020 Q3 report, around 36 billion records were compromised between January and September 2020. While this result is quite staggering, it also sends a clear message of ...
Data Lakehouse

The Data Lakehouse Post 2 – The Data Lakehouse Itself

In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do ...

The Data Lakehouse Post 1 – My Database Wishlist – A Rant

In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and ...

Don’t Let Your Stored Procedures Lack Integrity

Unfamiliar territory As a security analyst, engineer, or CISO, there are so many aspects of the field that require immediate attention that one cannot possibly know everything.  Some of the common areas ...
KeyValueBlog_21Dec.png

What’s the Value of a Key-Value Store?

A database back end for your application is vital, and odds are that your database is a relational database or a "not only SQL" (NoSQL) database. Relational databases have dominated the software ...
Elasticsearch Database with 42 Million Records of Iranian Citizen Found Exposed Online

Elasticsearch Database with 42 Million Records of Iranian Citizen Found Exposed Online

An Elasticsearch database holding 42 million records of Iranian Telegram users was found on the web, for anyone to access. The private data included phone numbers and user names, and it’s unclear ...