Referenced link: https://0day.today/exploit/description/38265
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1636481405990449153#m
#0day #Microsoft #SQL #Server 2014 / 2016 / 2017 / 2019 / 2022 Audit Logging Failure #Vulnerability #MicrosoftSQLServer https://0day.today/exploit/description/38265
#0day #microsoft #SQL #server #Vulnerability #MicrosoftSQLServer
Spend most of my workday performing a full restore of a corrupted #Elasticsearch instance. In related news: In 25 years working with #Oracle, #MicrosoftSQLServer, #PostgreSQL and even #MySQL/#MariaDB (!) I never lost a single bit of data.
#ElasticSearch #oracle #MicrosoftSQLServer #postgresql #mysql
Last week, we mentioned you can customize system-wide cryptographic policies to your needs; did you know that these policies can cover workloads as well? See how you can use Transparent Data Encryption (TDE) on #MicrosoftSQLServer with #RHEL! https://lab.redhat.com/tracks/sql-server-crypto-policy #selfpaced
#MicrosoftSQLServer #rhel #SelfPaced
Advanced LotL persistence technique identified, affecting Microsoft SQL servers.
The goals of the campaign as well as the identity of the threat actor remain unknown at the time of this toot.
#persistence #LotL #LOLBin #MicrosoftSQLServer
https://thehackernews.com/2022/05/hackers-gain-fileless-persistence-on.html
#persistence #LotL #LOLBin #MicrosoftSQLServer