Read the latest news on cybersecurity incidents and software vulnerabilities, as well as entries explaining specific attacks or instructing how to perform them.

Photo by sebastiaan stam on Unsplash

Carlos Bello

Injecting JS into one site is harmful, into all, lethal

In this blog post, we present in detail a vulnerability we discovered in Rushbet v2022.23.1-b490616d, along with the steps to follow to replicate the exploit.

Photo by Nahel Abdul Hadi on Unsplash

Carlos Bello

So it's the app itself that delivers the cookie to me?

In this blog post, I present in detail a zero-day vulnerability I discovered in KAYAK v161.1, along with the steps to follow to replicate the exploit.

Photo by Axel Ruffini on Unsplash

Andres Roldan

A Black Hat talk follow up

We will take a brief understanding at DirectX, a new attack surface on Hyper-V

Photo by Lucrezia Carnelos on Unsplash

Felipe Ruiz

Chances are you're vulnerable with Microsoft Office

In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.

Photo by Lenny Kuhne on Unsplash

Andres Roldan

Cross-process memory patching with Python

We will take AMSI bypass to another level by using cross-process memory injection.

Photo by Jez Timms on Unsplash

Jason Chavarría

How does this clever Linux Trojan operate?

Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Photo by Alexander Aguero on Unsplash

Felipe Ruiz

Conti gang relentlessly lashes their vulnerable systems

It's been almost two weeks since the beginning of the Conti gang's new wave of cyberattacks against Costa Rican organizations. Find out here what has happened.

Photo by Chris Briggs on Unsplash

Felipe Ruiz

Three strikes already for this web browser in 2022

In this blog post, you can learn about three zero-day vulnerabilities of at least high severity in Google Chrome that have been exploited this year.

Photo by Timothy Dykes on Unsplash

Jason Chavarría

Buggy package managers, some only on Windows

Researchers found vulnerabilities in some versions of eight popular package managers. We review how an attacker could exploit them and urge everyone to upgrade.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.