Ask HN: How do you do threat detection for databases? | Dark Hacker News