What are design and security considerations for a site that connects to its users’ own dbs?

I’m envisaging a website where a user signs up, has their own database running somewhere, then provides credentials to the website so that website can access that database. For example, if I was the user, I might be running M… Continue reading What are design and security considerations for a site that connects to its users’ own dbs?

Mongo Lock Ransomware Deletes Vulnerable MongoDB Databases

Mongo Lock is a new attack that is aimed at MongoDB databases which have no protection and remote access left open. Mongo Lock is a ransomware threat, which wipes these databases and uses extortion tactics like any other ransomware to…Read more
The p… Continue reading Mongo Lock Ransomware Deletes Vulnerable MongoDB Databases

Is it possible to get data from database server if you are on the application server?

For example, You are attacking an application that employs two different servers: an application server and a database server. You have discovered a vulnerability that allows you to execute arbitrary operating system commands… Continue reading Is it possible to get data from database server if you are on the application server?