Tech »  Hackers Exploit Legitimate Commands to Breach Databases