#prepared-statements

[ follow ]
Information security
fromTNW | Insights
4 days ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Software development
fromInfoQ
5 days ago

TigerFS Mounts PostgreSQL Databases as a Filesystem for Developers and AI Agents

TigerFS is an experimental filesystem that integrates PostgreSQL, allowing file operations through a standard filesystem interface.
DevOps
fromInfoQ
5 days ago

Replacing Database Sequences at Scale Without Breaking 100+ Services

Validating requirements can simplify complex problems, and embedding sequence generation reduces network calls, enhancing performance and reliability.
Information security
fromInfoWorld
6 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Python
fromRealpython
2 weeks ago

Understanding CRUD Operations in SQL - Real Python

CRUD operations are essential for creating, reading, updating, and deleting data in applications.
DevOps
fromInfoQ
1 week ago

ProxySQL Introduces Multi-Tier Release Strategy With Stable, Innovative, and AI Tracks

ProxySQL 3.0.6 introduces a multi-tier release strategy focusing on stability, innovation, and AI capabilities for diverse user needs.
Privacy professionals
fromSecurityWeek
3 weeks ago

Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact

Major corporations targeted in Oracle EBS zero-day exploits by Cl0p ransomware group remain silent on breach impacts despite public victim listings.
Business intelligence
fromInfoWorld
3 weeks ago

Why Postgres has won as the de facto database: Today and for the agentic future

Leading enterprises achieve 5x ROI by adopting open source databases like PostgreSQL to unify structured and unstructured data for agentic AI, with 81% of successful enterprises committed to open source strategies.
Online Community Development
fromInfoWorld
4 weeks ago

Oracle rejects request it give up control of MySQL

Oracle refused to restructure MySQL Community Edition governance despite requests from database companies and 544 users, though it promised increased transparency and feature parity with commercial versions.
DevOps
fromInfoWorld
3 weeks ago

Update your databases now to avoid data debt

Multiple major open source databases reach end-of-life in 2026, requiring teams to plan upgrades and migrations to avoid security risks and higher costs.
#oracle
fromTechzine Global
2 weeks ago
Information security

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
fromThe Hacker News
2 weeks ago
Information security

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Oracle released security updates for a critical vulnerability in Identity Manager and Web Services Manager that allows remote code execution.
Information security
fromTechzine Global
2 weeks ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
Information security
fromThe Hacker News
2 weeks ago

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Oracle released security updates for a critical vulnerability in Identity Manager and Web Services Manager that allows remote code execution.
Data science
fromInfoWorld
1 month ago

The revenge of SQL: How a 50-year-old language reinvents itself

SQL has experienced a major comeback driven by SQLite in browsers, improved language tools, and PostgreSQL's jsonb type, making it both traditional and exciting for modern development.
Software development
fromDevOps.com
1 month ago

When AI Gets It Wrong: The Insecure Defaults Lurking in Your Code - DevOps.com

Generative AI accelerates code development but introduces security vulnerabilities because AI models learn insecure patterns from training data rather than understanding security principles.
Information security
fromThe Hacker News
3 weeks ago

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

Amazon Bedrock AgentCore Code Interpreter's sandbox allows outbound DNS queries, enabling attackers to exfiltrate data and establish command-and-control channels despite network isolation configuration.
Software development
fromInfoQ
1 month ago

MySQL 9.6 Changes Foreign Key Constraints and Cascade Handling

MySQL 9.6 moves foreign key constraint and cascade management from InnoDB storage engine to SQL layer, improving CDC pipeline accuracy and data consistency across replication and analytics workloads.
fromDbmaestro
4 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
fromSecurityWeek
1 month ago

How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development

This extends to the software development community, which is seeing a near-ubiquitous presence of AI-coding assistants as teams face pressures to generate more output in less time. While the huge spike in efficiencies greatly helps them, these teams too often fail to incorporate adequate safety controls and practices into AI deployments. The resulting risks leave their organizations exposed, and developers will struggle to backtrack in tracing and identifying where - and how - a security gap occurred.
Artificial intelligence
Java
fromTheregister
2 months ago

Java devs want container security - not the hassle

Many Java developers prefer pre-hardened container providers because securing containers and related tooling is time-consuming, error-prone, and constrained by organizational resources.
Data science
fromTreehouse Blog
2 months ago

Beginning SQL: 10 Essential Query Patterns

Recognizing common SQL query patterns enables beginners to retrieve, filter, summarize, and reason about data effectively across industries.
#mysql
fromInfoWorld
1 month ago
Software development

Community push intensifies to free MySQL from Oracle's control amid stagnation fears

fromInfoWorld
1 month ago
Software development

Community push intensifies to free MySQL from Oracle's control amid stagnation fears

Artificial intelligence
fromInfoWorld
2 months ago

With AI, the database matters again

AI turns databases from passive stores into critical context-assembly layers; reliable data infrastructure, consistency, and fast context retrieval are essential to prevent model hallucinations.
Information security
fromThe Hacker News
1 month ago

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Multiple critical vulnerabilities in Claude Code allow remote code execution and API credential theft when users open untrusted repositories.
Software development
fromDbmaestro
4 years ago

If You Don't Have Database Delivery Automation, Brace Yourself for These 10 Problems |

Manual database processes break DevOps pipelines; only 12% deploy database changes daily, causing configuration drift, frequent errors, slower time-to-market, and reduced productivity.
Tech industry
fromTheregister
2 months ago

Snowflake plugs PostgreSQL into its AI Data Cloud

Snowflake now offers a native PostgreSQL DBaaS in its AI Data Cloud to run transactional workloads alongside analytics and AI under unified governance.
fromInfoQ
1 month ago

VillageSQL Launches as an Extension-Focused MySQL Fork

A new open-source project, VillageSQL, has been introduced as a tracking fork of MySQL aimed at expanding extensibility and addressing feature gaps increasingly relevant to AI and agent-based workloads. Announced by founder Dominic Preuss, VillageSQL Server for MySQL is positioned as a drop-in replacement that maintains compatibility with upstream MySQL while adding a structured extension framework. The alpha release is now available for experimentation.
Software development
#database-devops
Information security
fromDroids On Roids
2 months ago

When ZeroWidth Isn't Zero: How I Found and Fixed a Vulnerability | Blog

Unicode Variation Selectors can inflate UTF-16 storage size while still passing perceived-length checks, enabling payload injection, performance issues, and possible database crashes.
Information security
fromDEV Community
2 months ago

I Let Claude Write 60 Functions. 65-75% Had Security Vulnerabilities.

AI code generation models produce insecure code by default, with no statistically significant difference among the tested models.
Software development
fromDbmaestro
1 year ago

Why Do You Need Database Version Control?

Database version control tracks schema and code changes, enabling CI/CD integration, collaboration, rollback, and faster, more reliable deployments across multiple databases.
#n8n
fromTheregister
2 months ago

Notepad++ patches update chain after targeted compromise

The admission comes after version 8.8.9 of the text editor was released on December 9. The "hardened" version verified the signature and certificate of downloaded installers during the update process. On December 27, version 8.9 was released, which dropped the use of a self-signed certificate. The project said: "Only the legitimate certificate issued by GlobalSign is now used to sign Notepad++ release binaries. We strongly recommend that users who previously installed the self-signed root certificate remove it."
Information security
#mongodb
fromInfoQ
2 months ago
Information security

MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB's Heap Memory

fromInfoQ
2 months ago
Information security

MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB's Heap Memory

Information security
fromThe Hacker News
2 months ago

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Web Help Desk has multiple critical vulnerabilities, including deserialization flaws enabling unauthenticated remote code execution; updates fixed issues in WHD 2026.1.
[ Load more ]