![Photo by Robs on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1717634219/blog/top-financial-data-breaches/cover_data_breaches_finance.webp)
Wendy Rodriguez
Consequential data breaches in the financial sector
Find out the harsh lessons that the most breached industry has to teach other companies.
![Photo by Sean Pollock on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1712856640/blog/top-ten-data-breaches/top-ten-data-breaches.webp)
Wendy Rodriguez
Data breaches that left their mark on time
A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.
![Photo by Florian Schmetz on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1712159396/blog/ransomware-prevention/cover_ransomware_prevention_1.webp)
Wendy Rodriguez
The best offense is a good defense
Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act.
![Photo by Sebastian Pociecha on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1711043923/blog/10-biggest-ransomware-attacks/cover_biggest_ransomware_attacks_1.webp)
Wendy Rodriguez
Historic events that will inspire you to act
In this post, we talk about the biggest and most impactful ransomware attacks in history that emphasize the need to take cybersecurity measures.
![Photo by Pawel Czerwinski on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1707177731/blog/indirect-prompt-injection-llms/cover_indirect_prompt_injection_llms.webp)
Felipe Ruiz
Attackers can indirectly instruct AI for malicious aims
We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.
![Photo by ANIRUDH on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1702491421/blog/citrix-bleed-and-ransomware-attacks/cover_citrixbleed.webp)
Jason Chavarría
Boeing, 60 credit unions, and more, have been impacted
The U.S. has been a major focus of ransomware attacks leveraging the Citrix Bleed vulnerability. We tell you about recent exploits involving this security flaw.
![Photo by Fotis Fotopoulos on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1700587805/blog/lfr-via-blind-ssrf-book-stack/cover_bookstack.webp)
Carlos Bello
Beware of insecure-by-default libraries!
Here we present in detail a vulnerability we discovered in BookStack v23.10.2, along with the steps to follow to replicate the exploit.
![Photo by Aaron Burden on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1695396598/blog/microsoft-38tb-data-leak/cover_microsoft_38tb_data_leak.webp)
Jason Chavarría
Among exposed were secrets, code and AI training data
We describe the leak and mention its causes and threats, talk about the possible security risks when using Azure SAS tokens and give advice to prevent leaks.
![Photo by Yeshi Kangrang on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1690245566/blog/rce-in-papercut-mf-ng-via-csrf/cover_rce_in_papercut_mf_ng_via_csrf.webp)
Carlos Bello
What is invisible to some hackers is visible to others
Here we present in detail a vulnerability we discovered in PaperCut MF/NG v22.0.10, along with the steps to follow to replicate the exploit.