Misconfigured Databases Targeted Hours After Deployment

CERT-LatestNews ThreatsCybercrime ThreatsStrategic VulnerabilitiesAll VulnerabilitiesApplications VulnerabilitiesDBMS VulnerabilitiesMicrosoft VulnerabilitiesNetwork

Researchers left a poorly configured database open on the Internet to learn who would connect to it and what they would steal.

Misconfigured databases are subject to attack hours after they appear online, Comparitech researchers report. The team sought to learn more about how attackers target….