Good attacks make good detections make good attacks make..

(The making of a MySQL Canarytoken) tl;dr Consider this scenario: An industrious attacker lands on one of your servers and finds a 5MB MySQL dump file (say, called prod_primary.dump). What do they do next? Typically, they would load this dump-file into a temporary database to rummage through the data. As soon as they do, you get an email/SMS/alert letting you know: Eds note: You can create and deploy these by visiting (completely free; no registration needed) There are obvious benefits

Continue Reading

Site Footer

Authored with 💚 by Thinkst