Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Session Recording Summaries for SSH, Kubernetes Exec, and Postgres

Since Teleport 1.0, we have shipped built-in session recording and replay. Nine years later, we are shipping the biggest upgrade yet: AI Session Summaries. Teams using Teleport onboard thousands of engineers (developers, DBAs, Windows users) who run thousands of interactive sessions every day. That easily adds up to 5,000+ hours of recordings per month, which is too much for humans to review proactively.

How to Backup an SQL Database

Database failures strike without warning. Hardware crashes, human errors, and ransomware attacks can shut down your entire operation in minutes. When disaster hits, your SQL database backup strategy determines whether you face a quick recovery or weeks of downtime. This article shows you exactly how to backup SQL databases using proven methods that work. You’ll master T-SQL commands, SSMS operations, and PowerShell automation scripts.

Scaling Vector Databases With Novel Partitioning Methodologies

Imagine: A newly acquired dataset is being prepared for use as a vector database to retrieve information, create recommendation systems, be used for threat detection or similarity-based alert triage. During integration, however, operational challenges surface. Platform constraints prevent full-scale ingestion, prompting an arbitrary reduction in the size of the dataset. As a result, performance degrades significantly.

Using SQLmap to Dig for Sensitive Data in SQL Databases

In our latest report Data Pirates' Toolkit (Leveraging SQLmap for Unearthing Digital Gold), we take a comprehensive look at a tried-and-tested cyberattack methodology that threat actors can use to unlock sensitive and critical data from unsecured databases: SQL injection (SQLi) attacks.

How Fidelis Integrates Detection and Response for SQL-Based Exploits

SQL injection attacks remain one of the most dangerous and frequently exploited web vulnerabilities—even in today’s age of secure coding and DevSecOps. Despite widespread awareness, attackers continue to target database-driven applications using clever payloads that evade surface-level defenses. The challenge isn’t just that SQL injections still work—it’s that many organizations don’t detect them until it’s too late.

Top Questions to Ask During a Database Programmer Interview

So, you're looking to hire database developer talent, or you're a candidate preparing to land that dream role. Either way, crafting the right interview questions is crucial. It's not just about ticking boxes; it's about delving deep into a candidate's technical prowess, unraveling their problem-solving mindset, and assessing how well they'll integrate into your team's unique rhythm. For businesses aiming to build robust, scalable systems, the decision to hire database programmer expertise is foundational. This guide will walk you through insightful questions designed to pinpoint top talent and help interviewers make informed choices.

The Attack Vector: Database Triggers as Persistence Mechanisms

Organizations often assume that restoring a backup to a patched environment eliminates threats. However, backups encapsulate both data and schema objects, including triggers. A compromised backup, often taken after an initial breach, may contain hidden triggers that reactivate the attacker’s access upon restore. This post explores how malicious triggers in compromised backups can serve as persistence mechanisms for attackers and how to mitigate this threat.

Open Chroma Databases: A New Attack Surface for AI Apps

Chroma is an open-source vector store–a database designed to allow LLM chatbots to search for relevant information when answering a user’s question–and one of many technologies that have seen adoption grow with the recent AI boom. Like many databases, Chroma can be configured by end users to lack authentication and authorization mechanisms.

Redis Backup Strategies: Essential Methods and Best Practices

Redis serves as a critical component for organizations managing high-performance data operations, with Redis Labs reporting substantial adoption across all industries. Proper Redis backup strategies remain fundamental for protecting business operations and preventing costly data loss. This guide offers practical methods for Redis backup and restore processes.

What is Union-based SQLi? How Hackers Exploit Your Database

Union-based SQL injection is one of the oldest—and most dangerous—ways attackers steal sensitive data from your databases. By exploiting the UNION operator in SQL, they can merge malicious queries with legitimate ones and extract usernames, emails, passwords, and more. This video explains how the attack works, why it's still a threat, and what steps you can take to prevent it.