![Photo by Brian Kelly on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1713388624/blog/undersupported-digital-infrastructure/cover_undersupported_digital_infrastructure.webp)
Felipe Ruiz
We need you, but we can't give you any money
We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.
![Photo by Roy Muz on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1712696620/blog/lessons-cybersecurity-black-swans/cover_lessons_cybersecurity_black_swans.webp)
Felipe Ruiz
Lessons learned from black swans
There are also "black swans" in cybersecurity. We can run into one of them at any time, so we must be prepared.
![Photo by Valery Fedotov on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1711073708/blog/nebraska-joke-infrastructure-dependency/cover_nebraska_joke_infrastructure_dependency.webp)
Felipe Ruiz
A digital infrastructure issue that many still ignore
The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.
![Photo by A S on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1709774678/blog/justify-investment-in-cybersecurity/cover_justify_investment_in_cybersecurity.webp)
Felipe Ruiz
How can we justify the investment in cybersecurity?
While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.
![Photo by Kenrick Mills on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1708380065/blog/on-premises-cloud-security/cover_on_premises_cloud_security.webp)
Felipe Ruiz
On-premises or in the cloud, security is your concern
We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.
![Photo by Mike Lewinski on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1707840268/blog/rely-on-code-assisted-pentesting/cover_rely_on_code_assisted_pentesting.webp)
Felipe Ruiz
It's about time you relied on code-assisted pentesting
Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.
![Photo by Pawel Czerwinski on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1707177731/blog/indirect-prompt-injection-llms/cover_indirect_prompt_injection_llms.webp)
Felipe Ruiz
Attackers can indirectly instruct AI for malicious aims
We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.
![Photo by Ray Hennessy on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1706319423/blog/the-mother-of-all-breaches/cover_the_mother_of_all_breaches.webp)
Felipe Ruiz
Let's rather say a bunch of breaches in a single box
They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.
![Photo by Fervent Jant on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1706217218/blog/adversarial-machine-learning-nist/cover_adversarial_machine_learning_nist.webp)
Felipe Ruiz
NIST sheds light on the classification of attacks on AI
Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.