Photo by Daniel McCullough on Unsplash

Interview With Safety Detectives

Mauricio Gomez talking about Fluid Attacks


Mauricio Gomez, a co-founder of Fluid Attacks, recently had an interview with Aviva Zacks of...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (III)

Glimpsing the trends for 2021


In this final part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (II)

Current trends in prevention


In this second part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Karsten Winegeart on Unsplash

Secure Just by Being in a Cave?

Security of OSS — Fluid Attacks as a vivid example


We want to remind you that hiding your applications' source code can often provide you only an...



Photo by Joanna Kosinska on Unsplash

Cybersecurity as Strategy

Strategize with cybersecurity and avoid losses


A recently published article calls to elevate cybersecurity from operational to a strategic...



Photo by Charles Deluvio on Unsplash

"No, We Won't Get Hacked!"

And, "of course, I can always protect my company."


In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...



Photo by Cookie the Pom on Unsplash

My Favorite Password: '123456'

You could be a victim of Credential Stuffing


I wrote this post to give you an overview of the Credential Stuffing attack and some short...



Photo by Christina @ wocintechchat.com on Unsplash

HEVD: Local Privilege Escalation

Local Privilege Escalation


In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD



Photo by Michael Dziedzic on Unsplash

HEVD: kASLR + SMEP Bypass

Bypassing OS protections


In this article we will defeat some protections using several techniques for exploting HackSys...



Photo by Chaozzy Lin on Unsplash

HEVD: Denial of Service

How to crash Windows


This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver...



Photo by Wesley Caribe on Unsplash

Windows Kernel Exploitation: Lab

Getting in the deeps of the OS


This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy