Photo by Christopher Skor on Unsplash

Time for the U.S. to Strike Back?

SolarWinds could be the start of a U.S.-Russia cyberwar


Here you can find experts' opinions about the SolarWinds attack and some suggestions that could...



Photo by Cristofer Jeschke on Unsplash

And Don't Forget ISO/IEC 30111

Guidelines for the vulnerability handling processes


This post is related to vulnerability handling processes (ISO/IEC 30111), complementing the...



Photo by Keagan Henman on Unsplash

Don't Be Ignorant of ISO/IEC 29147

Guidelines for the vulnerability disclosure processes


Would you like to get a clearer idea about vulnerability disclosure? Start with reading this...



Photo by Shannon Litt on Unsplash

Sudo Heap Overflow CVE-2021-3156

Replicating CVE-2021-3156 with AFL


In this article we will be able to reproduce the bug described on CVE-2021-3156 using fuzzing.



Photo by Jono Hirst on Unsplash

Thoughtless Vulnerability Reporting

The Colombian Foreign Ministry faced a big trouble


Here I give you an overview of the recent Colombian Foreign Ministry's security problem and the...



Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Photo by Guido Hofmann on Unsplash

Babuk Locker for the 2021

The first ransomware (as a gift) for this new year


Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...



Photo by Chase Moyer on Unsplash

Tribe of Hackers Red Team 4.0

Learning from the red team expert 'Tinker Secor'


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Dorinel Panaite on Unsplash

Tribe of Hackers Red Team 3.0

Learning from the red team expert Georgia Weidman


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by eberhard grossgasteiger on Unsplash

I Saw Your Data on the Dark Web

What is the Dark Web and what do we find there?


I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we...



Photo by Manyu Varma on Unsplash

Tribe of Hackers Red Team 2.0

Learning from the red team expert Benjamin Donnelly


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Daniel McCullough on Unsplash

Interview With Safety Detectives

Mauricio Gomez talking about Fluid Attacks


Mauricio Gomez, a co-founder of Fluid Attacks, recently had an interview with Aviva Zacks of...




Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.