Blog | G5 Cyber Security

How SQL Injection Attacks Work

In this video, Ryan O Boyle of Veracode discusses the nature of SQL injection attacks and how to defend against them. One recent example is the attack on a Yahoo site that resulted in a breach of 450,000 usernames and passwords. The vulnerabilities and exploitation techniques are well-understood and widely discussed. However, they re still quite prevalent and are used in a variety of scenarios. In the video, O’Boyle explains how to protect against these attacks.

Source: https://threatpost.com/how-sql-injection-attacks-work-080312/76880/

Exit mobile version