Fluid Attacks Blog

Read our blog posts to learn about cybersecurity concepts, approaches, trends, news, techniques and more.

Filter by author:

Filter by tag:

Release date:

Filter by title:

Photo by A S on Unsplash

Felipe Ruiz


How can we justify the investment in cybersecurity?

While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.

Photo by Kenrick Mills on Unsplash

Felipe Ruiz


On-premises or in the cloud, security is your concern

We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.

Photo by Mike Lewinski on Unsplash

Felipe Ruiz


It's about time you relied on code-assisted pentesting

Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.

Photo by James Orr on Unsplash

Jason Chavarría


Our pick of the hardest challenges for ethical hackers

We share what to us are the 10 most challenging ethical hacking certifications, so that you can choose your next one and even trace a path to help your career.

Photo by Pawel Czerwinski on Unsplash

Felipe Ruiz


Attackers can indirectly instruct AI for malicious aims

We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.

Photo by Eduardo Balderas on Unsplash

Jason Chavarría


Understanding 51 new PCI DSS requirements made easy

PCI DSS v4.0 brings 51 new requirements that are best practices until March 2025. We share a classification that may help take it all in.

Photo by Ray Hennessy on Unsplash

Felipe Ruiz


Let's rather say a bunch of breaches in a single box

They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Photo by Fervent Jant on Unsplash

Felipe Ruiz


NIST sheds light on the classification of attacks on AI

Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.

Photo by Jeremy Perkins on Unsplash

Jason Chavarría


Comply with the new requirements due for March 2024

Companies that store, handle or transfer account data must comply with PCI DSS v4.0 from March 31. We summarize its 13 new requirements to be met on that date.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.