{"id":21811,"date":"2022-05-03T16:24:52","date_gmt":"2022-05-03T16:24:52","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21811"},"modified":"2022-05-04T14:46:40","modified_gmt":"2022-05-04T14:46:40","slug":"insecure-databases","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/","title":{"rendered":"Security Researchers Find Nearly 400,000 Exposed Databases"},"content":{"rendered":"<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\">Databases<\/a> contain some of the most critical data in enterprises, so <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerabilities<\/a> in them are serious issues.<\/p>\n<p>Researchers at Singapore-based cybersecurity company Group-IB recently <a href=\"https:\/\/www.group-ib.com\/media\/public-facing-db\/\" target=\"_blank\" rel=\"noopener\">discovered<\/a> thousands of databases exposed to the internet that could have been exploited when they were left unprotected. The Attack Surface Management team at Group-IB said it constantly scans the IPv4 landscape for exposed databases, potentially unwanted programs, and other risks. From Q1 2021 to Q1 2022, the team discovered 399,200 exposed databases due to those efforts.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/database-security-best-practices\/\">Database Security: 7 Best Practices &amp; Tips<\/a><\/p>\n<h2>Redis DBMS Tops the List<\/h2>\n<p>The open source Redis database management system (DBMS) was used by the majority of the exposed databases, followed by MongoDB and Elastic. Hackers could use the same methods as Group-IB to exploit the databases.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-21814\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/05\/database-vulnerabilities-1024x543.png\" alt=\"most vulnerable databases\" width=\"696\" height=\"369\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities-1024x543.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities-300x159.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities-768x407.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities-150x80.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities-696x369.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities-1068x566.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png 1500w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>According to Group-IB, the likelihood of the database systems being used in cybercrime and security breaches is high. A data breach, a follow-up strike on clients whose data was exposed, and other risks may result from an exposed database.<\/p>\n<p>When it comes to managing high-risk digital content, prompt discovery of vulnerabilities is critical because threat actors are good at recognizing an opportunity to steal sensitive data, escalate privileges or move laterally in the system.<\/p>\n<h2>Time to Resolve Issues is High<\/h2>\n<p>According to the Attack Surface Management team, an average of 170.2 days was required for an exposed database owner to resolve a security issue in the first quarter of 2021. The average time decreased gradually throughout 2021, but it returned to the original count of 170 at the start of 2022.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-21815\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/05\/time-to-patch-1024x538.png\" alt=\"patching databases\" width=\"696\" height=\"366\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/time-to-patch-1024x538.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/time-to-patch-300x158.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/time-to-patch-768x403.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/time-to-patch-150x79.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/time-to-patch-696x365.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/time-to-patch-1068x561.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/time-to-patch.png 1200w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>The pandemic was one of the primary reasons for the exposed databases. <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">Remote work<\/a> compelled organizations to connect their databases to the internet to allow employees access. Changes were frequently made hastily. The policies were incorrectly configured.<\/p>\n<h2>U.S. Organizations Most Exposed<\/h2>\n<p>Group-IB noted that <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> does not infect all internet-facing databases, they just have a chance of being impaired. The U.S. had the highest number of\u00a0 exposed databases, followed by China and Germany.<\/p>\n<p>According to Group-IB, 37.5% of exposed databases used the Redis database management system. MongoDB was the second most vulnerable database management system, used by 31% of the exposed databases. The third most susceptible database management system was Elastic, used by 29% of the exposed databases.<\/p>\n<p>Approximately 93,700 exposed databases were found on servers in the United States, followed by China, with 54,700 exposed databases. German servers hosted 11,100, and France hosted 9,723 of the exposed databases.<\/p>\n<p>&#8220;A lot of the security incidents can be prevented with very little effort and a good toolset,&#8221; stated Tim Bobak, Attack Surface Management Product Lead at Group-IB.<\/p>\n<p>&#8220;Last year, over 50% of our <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\">incident response<\/a> engagements stemmed from a preventable, perimeter-based security error. A public facing database, an open port, or a cloud instance running vulnerable software are all critical but ultimately avoidable risks. As the complexity of corporate networks keeps growing, all the companies need to have complete visibility over their attack surface.&#8221;<\/p>\n<p><em>See our picks for the <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\"><em>Top Database Security Solutions<\/em><\/a><\/p>\n<h2><strong>Expectations for Security Breaches Run High\u00a0<\/strong><\/h2>\n<p>As per Trend Micro&#8217;s recent international Cyber Risk Index (CRI) findings for the second quarter of 2021, 76% of those surveyed anticipate a breach within the next 12 months. While this represents a 10% decline, it still indicates critical security holes. Over one-third of organizations experienced seven or more impactful cyberattacks in the preceding 12 months, a 10% rise from the previous year.<\/p>\n<p>The semi-annual report&#8217;s findings quantify the gap between respondents&#8217; readiness for attacks and their probability of being breached. The CRI report surveyed over 3,500 chief information security officers (CISOs), IT professionals and managers from Asia-Pacific, North America, Europe, and South America in the latter part of 2021.<\/p>\n<p>The CRI study noted five major cyber threats:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">Social engineering<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing<\/a> attacks that gain entrance to networks via scam emails with malicious attachments or links<\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\">Botnets<\/a> that infiltrate and take control of a company&#8217;s network<\/li>\n<li>Fileless attacks that take over legitimate system tools<\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">Ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/distributed-denial-of-service-ddos-protection-vendors\/\">Denial of Service (DoS)<\/a> attacks that target victims&#8217; operational processes<\/li>\n<\/ul>\n<p>Cyber attacks can lead to stolen or broken tools, costly outside advisors and specialists, <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/compliance-gdpr-pipl-ccpa\/\">regulatory issues<\/a> and court cases, prestige or reputational damage, and customer turnover, security researchers note.<\/p>\n<p>When it comes to IT infrastructure threats, companies are most concerned about mobile or remote employees, <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">third-party<\/a> apps, and smartphones. As a result, companies are spending on information security tools to enable secure remote work and increase business efficiency.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f34c66cc1-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f34c66cc1\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f34c66cc1\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f34c66cc1\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f34c66cc1\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f34c66cc1\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f34c66cc1\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Databases contain some of the most critical data in enterprises, so vulnerabilities in them are serious issues. Researchers at Singapore-based cybersecurity company Group-IB recently discovered thousands of databases exposed to the internet that could have been exploited when they were left unprotected. The Attack Surface Management team at Group-IB said it constantly scans the IPv4 [&hellip;]<\/p>\n","protected":false},"author":287,"featured_media":21814,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,15],"tags":[12817],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,429],"class_list":["post-21811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-threats","tag-database-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-database-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Researchers Find Nearly 400,000 Exposed Databases | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The open source Redis DBMS is used by the majority of the exposed databases, followed by MongoDB and Elastic.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Researchers Find Nearly 400,000 Exposed Databases | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The open source Redis DBMS is used by the majority of the exposed databases, followed by MongoDB and Elastic.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-03T16:24:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-04T14:46:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Olivia Chakraborty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Olivia Chakraborty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/\"},\"author\":{\"name\":\"Olivia Chakraborty\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/88b9314387963b5d5031e4f0d23a2a06\"},\"headline\":\"Security Researchers Find Nearly 400,000 Exposed Databases\",\"datePublished\":\"2022-05-03T16:24:52+00:00\",\"dateModified\":\"2022-05-04T14:46:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/\"},\"wordCount\":733,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png\",\"keywords\":[\"database security\"],\"articleSection\":[\"Applications\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/\",\"name\":\"Security Researchers Find Nearly 400,000 Exposed Databases | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png\",\"datePublished\":\"2022-05-03T16:24:52+00:00\",\"dateModified\":\"2022-05-04T14:46:40+00:00\",\"description\":\"The open source Redis DBMS is used by the majority of the exposed databases, followed by MongoDB and Elastic.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png\",\"width\":1500,\"height\":795,\"caption\":\"most vulnerable databases\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Researchers Find Nearly 400,000 Exposed Databases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/88b9314387963b5d5031e4f0d23a2a06\",\"name\":\"Olivia Chakraborty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/olivia.chakraborty-headshot-Olivia-Chakraborty-1-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/olivia.chakraborty-headshot-Olivia-Chakraborty-1-150x150.jpg\",\"caption\":\"Olivia Chakraborty\"},\"description\":\"Olivia is an India-based passionate artist who loves to read books of varied genres. She is curious like a cat and loves to research new technologies and write about them. Currently, she is freelancing as a content writer. She also loves listening to music, clicking photos, and interacting with new people.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/olivia-chakraborty\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Researchers Find Nearly 400,000 Exposed Databases | eSecurity Planet","description":"The open source Redis DBMS is used by the majority of the exposed databases, followed by MongoDB and Elastic.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/","og_locale":"en_US","og_type":"article","og_title":"Security Researchers Find Nearly 400,000 Exposed Databases | eSecurity Planet","og_description":"The open source Redis DBMS is used by the majority of the exposed databases, followed by MongoDB and Elastic.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/","og_site_name":"eSecurity Planet","article_published_time":"2022-05-03T16:24:52+00:00","article_modified_time":"2022-05-04T14:46:40+00:00","og_image":[{"width":1500,"height":795,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png","type":"image\/png"}],"author":"Olivia Chakraborty","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Olivia Chakraborty","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/"},"author":{"name":"Olivia Chakraborty","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/88b9314387963b5d5031e4f0d23a2a06"},"headline":"Security Researchers Find Nearly 400,000 Exposed Databases","datePublished":"2022-05-03T16:24:52+00:00","dateModified":"2022-05-04T14:46:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/"},"wordCount":733,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png","keywords":["database security"],"articleSection":["Applications","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/","url":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/","name":"Security Researchers Find Nearly 400,000 Exposed Databases | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png","datePublished":"2022-05-03T16:24:52+00:00","dateModified":"2022-05-04T14:46:40+00:00","description":"The open source Redis DBMS is used by the majority of the exposed databases, followed by MongoDB and Elastic.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/database-vulnerabilities.png","width":1500,"height":795,"caption":"most vulnerable databases"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/insecure-databases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Security Researchers Find Nearly 400,000 Exposed Databases"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/88b9314387963b5d5031e4f0d23a2a06","name":"Olivia Chakraborty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/olivia.chakraborty-headshot-Olivia-Chakraborty-1-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/olivia.chakraborty-headshot-Olivia-Chakraborty-1-150x150.jpg","caption":"Olivia Chakraborty"},"description":"Olivia is an India-based passionate artist who loves to read books of varied genres. She is curious like a cat and loves to research new technologies and write about them. Currently, she is freelancing as a content writer. She also loves listening to music, clicking photos, and interacting with new people.","url":"https:\/\/www.esecurityplanet.com\/author\/olivia-chakraborty\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21811"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/287"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21811"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21811\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21814"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21811"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21811"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21811"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}