In the first part of this series, we discussed the entry points that an intruder could use to attack our “building,” our metaphor for network security. In the next few posts, we shall focus on the next level: attack vectors. If vulnerabilities are the entry points, then attack vectors are the ways attackers can launch Read more…
Tags: buffer overflow, cross-site scripting, SQL Injection, xss
In early April, I wrote about the famed “LizaMoon” SQL-injection attacks. I said it then, and I’ll say it again now: SQL-injection (SQLi) attacks are a constant. Some of these attacks are more visible than others. Some adversaries find intelligent ways to hide their tracks so as not to splatter evidence of their misdeeds all over various search Read more…
Tags: Cybercrime, Data Protection, database security, enterprise, lizamoon, malware, mass sql injection, Network Security, sql attacks, SQL Injection, urchin.js
Posts tagged under SQL Injection