Vulnerabilities
A Deep Dive into Database Attacks [Part II]: Delivery and Execution of Malicious Executables through SQL commands (SQL Server)
An organization’s database servers are frequently the prime target of attackers. We recently started a new research project we named StickyDB to...