Mobile showing statistics. Photo by Austin Distel on Unsplash: https://unsplash.com/photos/EMPZ7yRZoGw

Battle Tendency

Most relevant IT investments in 2019


In this article, we discuss our research into the most relevant investments and budgets related...



Photo by NESA by Makers on Unsplash

Sastisfying App Security

An introduction to SAST


This blog post is an introduction to SAST. We share the concept, how SAST works, its types,...



Foosball red vs blue. Photo by Stefan Steinbauer on Unsplash: https://unsplash.com/photos/va-B5dBbpr4

Red Team Exercise

What is a Red Team exercise?


Here we give the reader a general context about what a Red Team does and the main strategy used...



CPU Usage. Photo by Alberto Duo on Unsplash: https://unsplash.com/photos/e4rcg33x4fA

Cryptojacking, a Real Malware?

Understanding cryptojacking "malware"


Here we'll explain the different types of cryptojacking and give an example. We'll also discuss...



Computer with do what is great sign.

Git on Steroids

From messy logs to Data Analytics


Learn here, among other things, how to define a Git commit message syntax and use real-time...



Cucumber lot

Gherkin on Steroids

How to document detailed attack vectors


In this post, we work on how to use Gherkin to document attack vectors in vulnerable...



Cucumber slices

Is Your App in a Pickle?

Documenting vulnerabilities with gherkin


Gherkin can be used for documentation and automated testing. Here we focus on its basics and how...



Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.