Hey! Your Database Got Pwned

OVERVIEW

A data breach is an organization’s worst nightmare.

Your databases can be used as a pivot to infiltrate the organization or may be the target to exfiltrate sensitive data.

In this talk we will explore different exploitation techniques used by attackers to attack databases.

We will dive into practical real life examples captured by our honeypots around the world and present advanced detection approach to identify attacks such as:

  • ransom and crypto mining campaigns
  • malware deployment
  • distributed brute-force attacks
  • evasion techniques
  • slow & low exfiltration

Presented By

SARIT YERUSHALMI
SARIT YERUSHALMI
Security Researcher, Imperva