Fluid Attacks Blog

Read our blog posts to learn about cybersecurity concepts, approaches, trends, news, techniques and more.

Filter by author:

Filter by tag:

Release date:

Filter by title:

Photo by Marek Szturc on Unsplash

Felipe Ruiz


A zero-day vulnerability in tj-actions/changed-files

GitHub Action breach! Learn how tj-actions/changed-files leaked secrets & how to protect your repos. Read our breakdown.

Photo by David Clode on Unsplash

Felipe Ruiz


For a better focus on vulnerabilities to be prioritized

At Fluid Attacks, we believe in the value of the EPSS metric, which is why we have implemented it in our solution, and in this post, we explain it extensively.

Photo by Steve Smith on Unsplash

Felipe Ruiz


F-scores and accuracy SLA at Fluid Attacks

Fluid Attacks in its ASPM solution offers its customers strict accuracy measures based on F-scores. Find out what it's all about.

Photo by Ümit Yıldırım on Unsplash

Felipe Ruiz


10 recent critical security breaches

The transportation and logistics sector is now among the most attacked worldwide. Discover some of the most significant recent cyber attacks.

Photo by Frankie Mish on Unsplash

Felipe Ruiz


Towards enhanced vulnerability prioritization

In this blog post, you will learn about reachability analysis, a software assessment technique that helps to prioritize vulnerabilities for their remediation.

Photo by Jr Korpa on Unsplash

Juan Díaz


How we enhance our tests by standardizing them

At Fluid Attacks, we built an internal testing framework to improve our tests in Python. Let's talk about our motivation and results.

Photo by Logan Weaver on Unsplash

Felipe Ruiz


Introduction to cybersecurity in the aviation sector

As part of the transportation industry, the aviation sector, in its massive digital transformation, has faced cybersecurity challenges worth highlighting.

Photo by Maxim Hopman on Unsplash

Jason Chavarría


Why measure cybersecurity risk with our CVSSF metric?

We present some of the flaws of the traditional measure of cybersecurity risk and introduce CVSSF, the risk-exposure-based metric with which we overcome them.

Photo by Jukan Tateisi on Unsplash

Daniel Salazar


Our new testing architecture for software development

Learn about how we test our platform, the pain points we faced in the past, and a new architecture that improves our testing quality and development experience.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Testing software security for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.