Summary

  • A member of Cybernews’ cybersecurity team found a leaked database which was publicly accessible using Google dorking techniques.
  • This involves using specific search operators to uncover vulnerabilities and sensitive data.
  • The backup database file that was found contained database credentials, hashed passwords, configuration details that could allow access to the system, and sensitive user data that could be exploited.
  • This is a cautionary tale to ensure that backups are stored securely and that any sensitive data they contain is protected from unauthorized access.
  • It underscores the importance of regularly auditing access controls and ensuring that any sensitive data is properly secured. Coordinated vulnerability disclosure is being handled by Cybernews’ team.

By HackerNasr

Original Article