Contact Us
Blog Articles
View our latest blog articles.

Enter a query to search using AI. You can explain what you’re looking for or copy paragraphs relevant to your search:

Latest posts:

  • WordPress Attack detection
    WordPress Attack Detection
    WordPress is a common application for managing websites. But this story is about how we detected an attack on a generic application.

    On Sunday morning, we got an anomaly alert. It was March 19, 2023. This story is about what happened. Background The Blue Core Research website uses WordPress (a free and open-source content management system). WordPress usually uses MySQL as a backend database, and our installation is no different. While our WordPress doesn’t contain sensitive data,…

    Read more

  • Costa Rica Hack
    Lessons from the Costa Rica government breach

    Introduction When I first heard the news, my first thought was – how can a hacker group breach so many systems across so many government agencies so quickly? My answer was simple: they cannot. The inevitable conclusion is that they have infiltrated the government systems for months, if not years, waiting for the time they…

    Read more

  • SQL Injection
    SQL Injection
    SQL Injection is one of the most well-known attack vectors and it poses a significant security challenge. Learn more about how SQL injection works, and the different approaches to solving it.

    Introduction SQL Injection is one of the most well-known attack vectors, and that’s largely because it poses a significant security challenge. The only way to understand the benefits and deficiencies of different solutions is by understanding the problem and the approach each solution has to solving it. The Problem The best way to understand the…

    Read more