Please turn on your JavaScript for this page to function normally.
Blue Core Research

How to evaluate the security risk of your databases
Data has become one of our most important assets. We usually store data in databases, so knowing how to secure those is of vital importance. This article can help you quantify …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM