Manipulated queries, in the context of cybersecurity, refer to the deliberate alteration of database queries or web requests by an attacker with the intention to exploit vulnerabilities, typically in web applications, to achieve unauthorized access or perform unauthorized actions. This technique is often used in SQL injection attacks, where attackers manipulate SQL queries through input fields to gain access to or manipulate the database. The attack can result in unauthorized viewing of data, data corruption, deletion, or the bypassing of authentication mechanisms.