Percona is excited to partner with Chainguard to bring a new standard of security to open source databases. 🔐 Together, we’re making it easier for organizations to run open source data infrastructure in production without the burden of building and maintaining secure container images themselves. Here’s what this means: ✔ Secure-by-default container images with near-zero CVEs ✔ Full Percona expert support across MySQL, PostgreSQL, MongoDB, Valkey, Redis, and more ✔ A simpler path to compliance across complex environments ✔ Less time patching and rebuilding, more time focused on innovation The result is production-ready open source databases with enterprise-grade backing. We’re proud to be among the first partners in this ecosystem and the only one delivering exclusively open source database support. Learn more: https://bit.ly/4sz6Uxt #OpenSource #Databases #CyberSecurity #DevOps
Percona Partners with Chainguard for Secure Open Source Databases
More Relevant Posts
-
Best and Most secure Databases! 🛡️🗄️ As we move further into 2026, choosing a database isn't just about storage anymore—it's about encryption, scalability, and high availability. Whether you are building a Fintech app that needs ACID compliance with PostgreSQL, or a real-time AI app requiring the speed of Redis, your choice of database will define your infrastructure's resilience. Here is a quick breakdown of the Top & Most Secure Databases to consider for your next project. 🚀 🔹 Top for Security: PostgreSQL & Oracle 🔹 Top for Scale: MongoDB & Cassandra 🔹 Top for Speed: Redis What’s your preferred database when security is the #1 priority? Let’s talk in the comments! 👇 #DataEngineering #CyberSecurity #CloudComputing #Database #TechTrends #SoftwareDevelopment #CodingLife
To view or add a comment, sign in
-
-
A high-severity vulnerability, CVE-2026-25611 (CVSS 7.5), has been discovered in MongoDB, allowing unauthenticated attackers to crash exposed servers using minimal bandwidth. According to Cato CTRL, it affects all MongoDB versions where compression is enabled (v3.4+, on by default since v3.6), including MongoDB Atlas. Furthermore, Shodan data indicates that over 207,000 MongoDB instances are currently exposed to the internet and at risk. Stay connected to Aashay Gupta, CISM,GCP for content related to Cybersecurity. #LinkedIn #Cybersecurity #Cloudsecurity #AWS #Cyberthreats https://lnkd.in/ewf2RNKU
To view or add a comment, sign in
-
📰 **New MongoDB Vulnerability Lets Hackers Crash Any MongoDB Server** A high-severity vulnerability in MongoDB lets unauthenticated attackers crash exposed servers with minimal bandwidth. 🔗 [Citeste articolul aici](https://lnkd.in/d9xwXDiX)
To view or add a comment, sign in
-
New #MongoDB #Vulnerability Could Let Attackers Crash Your #Database #Server A newly reported vulnerability in MongoDB allows unauthenticated attackers to crash exposed MongoDB servers with minimal bandwidth, potentially causing service disruption and downtime. The flaw, tracked as #CVE-2026-25611 (CVSS 7.5), can be exploited remotely without authentication, meaning an attacker only needs network access to a vulnerable instance to trigger a denial-of-service (DoS) condition. Why this matters MongoDB powers thousands of modern applications and #cloudservices. If exposed instances are exploited, attackers could disrupt production environments, impact application availability and potentially create cascading outages across dependent services. Recommended Remediation 1. #Upgrade MongoDB immediately to the latest patched version released by MongoDB. 2. Avoid exposing MongoDB directly to the internet; restrict access through private networks or VPN. 3. Enable authentication and role-based access controls (#RBAC). 4. Use #firewall rules or #securitygroups to limit inbound connections to trusted IP ranges. 5. Monitor #database logs and traffic patterns for abnormal connection attempts or crashes. Security takeaway 1. Database services should never be publicly accessible without strict controls. 2. A single exposed instance can become a DoS entry point for attackers targeting your application stack. Source: Cybersecurity News – https://lnkd.in/grzx6wnv #CyberSecurityNews #MongoDB #DatabaseSecurity #VulnerabilityManagement #ThreatIntelligence #AppSec #CloudSecurity #DevSecOps #DataSecurity #CyberThreats #Infosec #SecurityEngineering
To view or add a comment, sign in
-
A high-severity vulnerability, CVE-2026-25611 (CVSS 7.5), has been discovered in MongoDB, allowing unauthenticated attackers to crash exposed servers using minimal bandwidth. According to Cato CTRL, it affects all MongoDB versions where compression is enabled (v3.4+, on by default since v3.6), including MongoDB Atlas. Stay connected to Suprith Anchala for latest content. #LinkedIn #Cybersecurity #cybersecurity #appsec #devsecops #Datasecurity #DevSecOps #Development #Ansible https://lnkd.in/grQbqa29
To view or add a comment, sign in
-
🚨 New MongoDB Vulnerability Lets Hackers Crash Any MongoDB Server A high-severity vulnerability, CVE-2026-25611 (CVSS 7.5), has been discovered in MongoDB, allowing unauthenticated attackers to crash exposed servers using minimal bandwidth. It affects all MongoDB versions where compression is enabled (v3.4+, on by default since v3.6), including MongoDB Atlas. An attacker can send a tiny 47KB zlib-compressed packet while claiming an uncompressed size of 48MB to crash the server. Source: https://lnkd.in/d9xwXDiX ⚡ https://bunabyte.com
To view or add a comment, sign in
-
-
🚨 New High-Severity MongoDB DoS Vulnerability (CVE‑2026‑25611) Exposes Over 207,000 Servers A newly disclosed high-severity denial-of-service vulnerability in MongoDB, CVE‑2026‑25611, allows unauthenticated attackers to crash any internet‑exposed MongoDB instance using a tiny (~47KB) crafted packet. The issue lies in MongoDB’s OP_COMPRESSED wire protocol, where the server allocates memory based on a claimed uncompressedSize before validation. This creates a massive 1,027:1 amplification ratio, enabling attackers to exhaust system memory with minimal bandwidth. Impact highlights: Affects MongoDB 7.0, 8.0, 8.2 (pre‑patch) No authentication required attack occurs before MongoDB’s auth checks 512MB servers crash with ~457KB traffic; 64GB enterprise nodes crash with ~64MB Over 207,000 public MongoDB servers are exposed globally Indicators of compromise: Surges of TCP connections to port 27017 OP_COMPRESSED packets (opCode 2012) with huge uncompressedSize but tiny actual size Memory spikes and MongoDB process exits with code 137 (OOM kill) Patch & mitigation: Update immediately: 7.0.29, 8.0.18, 8.2.4 Block public exposure of 27017 Enforce private connectivity/IP allowlists Consider OS‑level memory cgroups to limit blast radius This flaw is a strong reminder: compression features in network protocols remain a high-value target, and default‑enabled features require constant scrutiny. 🔖 Hashtags #CyberSecurity #MongoDB #CVE202625611 #InfoSec #VulnerabilityManagement #DoS #CloudSecurity #ThreatResearch #BlueTeam #RedTeam #SecurityEngineering #DevSecOps #DatabaseSecurity #ZeroTrust
To view or add a comment, sign in
-
Critical #MongoDB vulnerability (CVE-2026-25611) allows unauthenticated attackers to crash servers. Update to patched versions or disable compression immediately. Link: https://lnkd.in/d24eAbT2 #Security #Vulnerability #Database #Update #Patch #Attack #Server #Crash #Threat #Breach #Exploit #Risk #Alert #Protection #Encryption #Data #Network #Software #IT #Safety
To view or add a comment, sign in
-
A high-severity vulnerability, CVE-2026-25611 (CVSS 7.5), has been discovered in MongoDB, allowing unauthenticated attackers to crash exposed servers using minimal bandwidth.
To view or add a comment, sign in
-
New blog is live: Offline vs. Immutable Backups for Azure SQL Database (General Guidance) If you’ve ever had to map “offline backups” vs “immutable (WORM) backups” to what Azure SQL actually supports today, this one’s for you. #AzureSQL #Backups #Security #Compliance #Ransomware #Cloud
To view or add a comment, sign in
🤝🤝🤝