The Global Playing Field is Leveling Out as Europe and Asia Take on More...
The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia...
A Deep Dive into Database Attacks [Part IV]: Delivery and Execution of Malicious Executables...
In a previous post we covered different techniques for execution of SQL and OS commands through Microsoft SQL server that can be used for...
Why the Path Towards Zero Trust Starts with Next-Gen Access
Zero Trust Security has gained a lot of popularity over the last six months. Almost daily you can read articles about this security strategy...
Streamline Compliance with SWIFT Customer Security Program Requirements
Transferring money from our bank accounts has never been easier than it is today. With a single click on our smartphones, we can transfer...
Pocket cryptofarms
In recent months, the topic of cryptocurrency has been a permanent news fixture — the value of digital money has been see-sawing spectacularly. Such...
Industrial Cyber Security For Dummies
Industrial Cyber Security For Dummies #outlook a{ padding:0; } body{ width:100% !important;...
DevOps-Ready WAF: Scaling Security for a More Agile Environment
With the maturation of DevOps, the growing concern around the security and compliance of more agile application development systems has made 2018 the year...
GDPR and Privacy: How to Earn the Trust of Your Customers and Keep Regulators...
Customer data is the lifeblood of any organisation and the key to unlocking sales and growth. But the data you hold and how you...
Making the Grade: Achieve SSL Labs A+ Grade with Imperva WAF
We all woke up to a new reality early last year. HTTPS adoption has reached the tipping point, meaning that more than half of...
Your new friend, KLara
While doing threat research, teams need a lot of tools and systems to aid their hunting efforts – from systems storing Passive DNS data...


![A Deep Dive into Database Attacks [Part IV]: Delivery and Execution of Malicious Executables through SQL Commands (MySQL)](https://www.dataproof.co.za/wp-content/uploads/2018/04/a-deep-dive-into-database-attacks-part-iv-delivery-and-execution-of-malicious-executables-through-sql-commands-mysql-218x150.png)












