Blue Core Research
Contact Us

Author: Eyal Kalderon

  • Costa Rica Hack

    Costa Rica Hack

    Introduction When I first heard the news, my first thought was – how can a hacker group breach so many systems across so many government agencies so quickly? My answer was simple: they cannot. The inevitable conclusion is that they have infiltrated the government systems for months, if not years, waiting for the time they…

  • SQL Injection

    SQL Injection

    Introduction SQL Injection is one of the most well-known attack vectors, and that’s largely because it poses a significant security challenge. The only way to understand the benefits and deficiencies of different solutions is by understanding the problem and the approach each solution has to solving it. The Problem The best way to understand the…

  • Database Auditing Requirements

    Many customers need to define requirements but building a good requirement document for database auditing is not simple. The reason is that customers who are new to the world of database auditing you are unlikely to be aware of the pitfalls and limitations products have and produce requirement documents that don’t protect them from such…