Feb 21 · 12 min read · Valenfind is a dating site Challenge that was part of the Love at First Breach 2026, red team beginner’s CTF. It covers Insecure Data Exposure via broken access control, where the entire database is a
Join discussion
Feb 18 · 13 min read · As discussed in Part 1 and Part 2 of this series, we had a look at SQL injection from a developer's perspective and discussed coding best practices related to SQL injection for JDBC, JPA, Spring Data, MyBatis, and stored procedures. This third part o...
Join discussion
Feb 10 · 16 min read · Welcome to Part 2 of this SQL injection in Java blog series. In Part 1, we introduced SQL injection and learned about secure coding best practices for SQL injections in JDBC, JPA/Hibernate, and Spring Data JPA. The second part will discuss the securi...
Join discussion
Feb 3 · 12 min read · SQL injection attacks are a common issue in modern web applications. In OWASP Top 10 2025, injection errors are one of the most significant threats to web application security. SQL injection attacks have been cited as one of the most common injection...
Join discussion
Dec 29, 2025 · 4 min read · A MongoDB flaw has emerged as a serious talking point in the developer and cybersecurity communities, raising concerns over how modern databases are secured at scale. The issue highlights weaknesses that can expose sensitive data if deployments are n...
Join discussion
Oct 19, 2025 · 7 min read · Introduction According to OWASP, SQL injection remains one of the most critical web application security risks. In this article, I'll demonstrate exactly how SQL injection works using a live Java Spring Boot POC, and show you the correct way to preve...
Join discussionOct 13, 2025 · 9 min read · Oracle Autonomous Database incorporates two powerful features that address critical database management challenges: automatic indexing for performance optimization and Oracle Data Safe for comprehensive security and compliance. Together, these capabi...
Join discussion
Oct 8, 2025 · 10 min read · Oracle Autonomous Database implements comprehensive security measures spanning automated maintenance, network access control, and end-to-end encryption. Understanding these integrated security capabilities is essential for organizations deploying mis...
Join discussion
Sep 17, 2025 · 4 min read · Introduction Data integrity and tamper-proof auditing are critical in financial, healthcare, and government applications. Starting from SQL Server 2022, Microsoft introduced Ledger Tables, a blockchain-like feature that guarantees immutability and cr...
Join discussion