Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (III)

Glimpsing the trends for 2021


In this final part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (II)

Current trends in prevention


In this second part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Lucas Benjamin on Unsplash

Tribe of Hackers Red Team 1.0

Learning from the Red Team Expert Marcus J. Carey


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Photo by Charles Deluvio on Unsplash

Always 100% Ready for Remote Work

The product of a valuable effort over ten years ago


Here is an overview of what our technological architecture and our way of operation are, which...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing


This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment


This post is based on the information given on February 7th by Sylvester, from Lumu, in his...



Photo by Terry Vlisidis on Unsplash

Penetration Testing as a Service

NetSPI's 'advice': better platforms for PTaaS


This blog post is based on the webinar 'Scaling Your Security Program with Penetration Testing...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy