Privileged database users can become an insider threat. Here are four steps to monitor and audit privileged users of data stores so you are immediately aware of anomalous activity and potential malicious behavior.
A Deep Dive into Database Attacks [Part II]: Delivery and Execution of Malicious Executables through SQL commands (SQL Server)
An organization’s database servers are frequently the prime target of attackers. We recently started a new research project we named StickyDB to learn more about database hacking, primarily to understand...
Scuba is a free tool that uncovers hidden security risks. With Scuba you can scan enterprise databases, identify risks to your databases and get recommendations on how to mitigate identified issues. Available for Windows, Mac, and Linux, Scuba offers 2,300+ assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL.