Fluid Attacks Blog

Read our blog posts to learn about cybersecurity concepts, approaches, trends, news, techniques and more.

Filter by author:

Filter by tag:

Release date:

Filter by title:

Photo by Sean Pollock on Unsplash

Wendy Rodriguez


Data breaches that left their mark on time

A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.

Photo by Roy Muz on Unsplash

Felipe Ruiz


Lessons learned from black swans

There are also "black swans" in cybersecurity. We can run into one of them at any time, so we must be prepared.

Photo by Florian Schmetz on Unsplash

Wendy Rodriguez


The best offense is a good defense

Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act.

Photo by Valery Fedotov on Unsplash

Felipe Ruiz


A digital infrastructure issue that many still ignore

The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.

Photo by Sebastian Pociecha on Unsplash

Wendy Rodriguez


Historic events that will inspire you to act

In this post, we talk about the biggest and most impactful ransomware attacks in history that emphasize the need to take cybersecurity measures.

Photo by A S on Unsplash

Felipe Ruiz


How can we justify the investment in cybersecurity?

While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.

Photo by Kenrick Mills on Unsplash

Felipe Ruiz


On-premises or in the cloud, security is your concern

We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.

Photo by Mike Lewinski on Unsplash

Felipe Ruiz


It's about time you relied on code-assisted pentesting

Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.

Photo by James Orr on Unsplash

Jason Chavarría


Our pick of the hardest challenges for ethical hackers

We share what to us are the 10 most challenging ethical hacking certifications, so that you can choose your next one and even trace a path to help your career.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.