Contact Us

Author: Eyal Kalderon

  • Anomaly Analysis

    Anomaly Analysis

    Anomaly analysis uses behavioral analysis, helping you save time while expanding your control to vast activity volumes. These capabilities are made possible by the unique security repository technology in Core Audit. The anomaly analysis engine dynamically creates behavioral profiles based on the activity captured by the security repository, allowing you to compare the present with…

  • Proactive Forensics

    Proactive Forensics

    One of the popular myths about security is that you can get it out of the box. Just install something, and voila! You’re magically secured. But that never works. Regardless of what you’re trying to secure, your first step should always be understanding the activity. You should know how the system is used, by whom,…

  • Fitted Security

    Fitted Security

    Many organizations design their cybersecurity strategy and decide what solutions to purchase based on industry trends and best practices. The outcome is often imbalanced and inappropriate to the organization’s risk profile and security needs. Best-practice implementations are usually one-size-fits-all and not tailored to the specific environment. Being predictable, there are usually tools and guides on…

  • SQL Injection attack detection

    SQL Injection attack detection

    This is a true story of a SQL injection attack on our website. Learn about the attack and why the Core Audit anomaly analysis database defense is the most effective way to combat this type of threat. Introduction We got an alert two days before New Year’s. It was shortly after midnight on December 30,…

  • WordPress Attack detection

    WordPress Attack detection

    On Sunday morning, we got an anomaly alert. It was March 19, 2023. This story is about what happened. Background The Blue Core Research website uses WordPress (a free and open-source content management system). WordPress usually uses MySQL as a backend database, and our installation is no different. While our WordPress doesn’t contain sensitive data,…

  • Risk Calculator

    Risk Calculator

    Estimate the risk of a data breach in your organization. By providing some information specific to your organization you will get an immediate estimate of the risks you are facing. Risk parameters How many people are in your organization? Number of employees Enter the number of employees in your company. Or, more accurately, the number…

  • Database security – self assessment

    The following questionnaire will help you evaluate the strength of your database security. It takes about 5 minutes to complete it and at the end you’ll get a score along with an email containing the results with detailed explanations.

  • Costa Rica Hack

    Costa Rica Hack

    Introduction When I first heard the news, my first thought was – how can a hacker group breach so many systems across so many government agencies so quickly? My answer was simple: they cannot. The inevitable conclusion is that they have infiltrated the government systems for months, if not years, waiting for the time they…

  • SQL Injection

    SQL Injection

    Introduction SQL Injection is one of the most well-known attack vectors, and that’s largely because it poses a significant security challenge. The only way to understand the benefits and deficiencies of different solutions is by understanding the problem and the approach each solution has to solving it. The Problem The best way to understand the…

  • Database Auditing Requirements

    Many customers need to define requirements but building a good requirement document for database auditing is not simple. The reason is that customers who are new to the world of database auditing you are unlikely to be aware of the pitfalls and limitations products have and produce requirement documents that don’t protect them from such…