Lateral movement-attackers can access database servers with operating system privileges, and use these permissions to access other sensitive systems.Delete data-attackers can delete database records or drop entire tables.Alter data-attackers can alter or add new data to the accessed database. ![]()
0 Comments
Leave a Reply. |