Clip

Securing a Compromised Database
listen on Spotify
36:54 - 38:33 (01:38)

The speaker discusses the steps they are taking to secure a compromised database, including taking down the database, changing the password, looking for evidence of back doors, and blocking the IP address of the attacker.

Similar Clips