Is using `crypt` in PostgreSQL for password comparison secure against timing attacks?

I’m currently using PostgreSQL with the pgcrypto extension to store and verify user passwords. When a user logs in, I compare the entered password with the stored hash using the following query:
SELECT id FROM users
WHERE email = ‘example… Continue reading Is using `crypt` in PostgreSQL for password comparison secure against timing attacks?

Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot

Users exposing poorly secured PostgreSQL and MySQL servers online are in danger of getting their databases wiped by a ransomware bot, Border0 researchers are warning. The attackers asks for a small sum to return / not publish the data, but those who pa… Continue reading Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot

PostgreSQL 16: Where enhanced security meets high performance

PostgreSQL is an open-source object-relational database platform with a track record of over 25 years of ongoing development. Its reputation is solid for its reliability, extensive features, and high performance. PostgreSQL 16 enhances its performance … Continue reading PostgreSQL 16: Where enhanced security meets high performance

Google Cloud Next ’23: New Generative AI-Powered Services

A partnership with NVIDIA on supercomputing and an enterprise-grade version of Google Kubernetes Engine top the array of cloud and AI reveals. Continue reading Google Cloud Next ’23: New Generative AI-Powered Services

How to do character escaping in PostgreSQL to prevent a SQL injection attack?

I want to prevent SQL injection attacks in a rather abstract application. Therefore I want to escape all user provided input as described here. The other options provided on this page don’t fit in my scenario.
I couldn’t find the right pla… Continue reading How to do character escaping in PostgreSQL to prevent a SQL injection attack?

postgres database information passing in request can we exploit further? [closed]

Application login request is shown below.
The postgres information is passed via the cabinetName parameter. Is it a vulnerability? is it useful? can we exploit it?
or any other ways to exploit below request?
POST /<REDACTED>/LoginSer… Continue reading postgres database information passing in request can we exploit further? [closed]