🦞🌯 Lobster Roll

Thread

Data exfiltration through the VMware hypervisor (idontplaydarts.com)

Stories related to "Data exfiltration through the VMware hypervisor" across the full archive.

Data exfiltration through the VMware hypervisor (idontplaydarts.com)
The making of a MySQL Canarytoken and blind SQL injection MySQL data exfiltration (blog.thinkst.com)
Total security in a PostgreSQL database (ibm.com)
Replicated Data Consistency Explained Through Baseball (research.microsoft.com)
Life in a post-database world: using crypto to avoid DB writes (neosmart.net)
I don't necessarily agree with what's here, but it seemed worthy of consideration or discussion.
6 Notorious Cases of Data Loss From History (r1soft.com)
Since the dawn of time, people have misplaced things and information has been lost. Whether it be through the manipulation of ancient manuscripts or the improper configuring of computer scripts, all data has the potential to be compromised or lost completely. As hosting providers, protecting sensiti...
It's the Data, Stupid! (blog.shodan.io)
ZeroDB - An end-to-end encrypted database (github.com)
Here's the homepage - http://www.zerodb.io/
Over 650 terabytes of data up for grabs due to publicly exposed MongoDB databases (networkworld.com)
191 Million US Voter Registration Records Leaked In Mystery Database (forbes.com)
Link to the reddit post where the discoverer posted: https://www.reddit.com/r/privacy/comments/3yinij/entire_us_voter_registration_record_leaks_191/
Five Things to Know about Databases that Leverage Partially Homomorphic Encryption (lab41.org)
ZeroDB whitepaper | end to end encrypted database (arxiv.org)
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers (arxiv.org)
IntegriDB - Verifiable SQL for Outsourced Databases (2015) (umiacs.umd.edu)
ACIDRain: Concurrency-Related Attacks on Database-Backed Web Applications (bailis.org)
Building Searchable Encrypted Databases with PHP and SQL (paragonie.com)
How 2,000 Unsecured Databases Landed on the Internet (zeit.de)
ACIDRain: concurrency-related attacks on database backed web applications (blog.acolyer.org)
Securing Your Database (vertabelo.com)
Automatic database management system tuning through large-scale machine learning (blog.acolyer.org)
Wandering through the Shady Corners of VMware Workstation/Fusion (comsecuris.com)
Amazon Aurora: Design Considerations for High Throughput Cloud-Native Relational Databases (allthingsdistributed.com)
Exfiltration of personal data by session-replay scripts (freedom-to-tinker.com)
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies (2015) (usenix.org)
Meterpreter over DNS - Data exfiltration with Metasploit (asintsov.blogspot.ch)
PORTKnockOut: Data Exfiltration via Port Knocking over UDP (2016) (sans.org)
Data Exfiltration is arguably the most important target for a security researcher to identify. The seemingly endless breaches of major corporations are done via channels of various stealth, and an endless array of methods exist to communicate the data to remote endpoints while bypassing Intrusion De...
Why Scarlett Johansson’s Picture Got My Postgres Database to Start Mining Monero (imperva.com)
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines (arxiv.org)
Data exfiltration with FPM servers (HHVM and rarely PHP) (openwall.com)
Router Network Isolation Broken By Covert Data Exfiltration (bleepingcomputer.com)