Opinions

Read our or other experts' take on cybersecurity topics, such as trends, technology, certifications and ethical hacking.

Photo by Ralston Smith on Unsplash

Felipe Ruiz


A simple approach to try out in cybersecurity training

We present a short review of a study in which the authors suggest an approach to introduce and encourage software developers to use secure coding practices.

Photo by Oleksii Khodakivskiy on Unsplash

Andres Roldan


A Certified Red Team Lead (CRTL) Review

In this post we review the RTO-2 course and CRTL certification offered by Zero-Point Security.

Photo by Erwan Hesry on Unsplash

Felipe Ruiz


Threat landscape and preventive measures for next year

Thanks to this blog post, you will get an idea of possible threats and preventive measures that will take place in the cybersecurity context in 2023.

Photo by jean wimmerlin on Unsplash

Jason Chavarría


Trends in cyberattacks and prevention this year

In this post, Fluid Attacks shares a digest of trends in cyberattacks and prevention in 2022.

Photo by Andrew Neel on Unsplash

Felipe Ruiz


Top 10 international capture the flag competitions

Do you know what capture the flag is in the cybersecurity field? Are you aware of some of the most recent and prominent CTF competitions worldwide? Learn here.

Photo by Alex Kotliarskyi on Unsplash

Jason Chavarría


Top 10 offensive security international conferences

Want to know which are the best conferences for hackers? We share our selection of the top 10 international hacking events focusing on offensive security.

Photo by Geran de Klerk on Unsplash

Rafael Alvarez


Five policies to test your organization's security

We want to guide you about some management policies that we suggest you could use to answer with high precision how secure your information is.

Photo by Liam Pozz on Unsplash

Jason Chavarría


You should switch to Git right now

Switching to Git will boost your productivity and allow you to go fast. It will also open up your possibility of achieving DevSecOps with us.

Photo by MD_JERRY on Unsplash

Jason Chavarría


What developers should look for in open-source software

Developers need to mitigate risks when using open-source software (OSS). We share basic aspects by which developers can guide their choice of OSS.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.