Photo by Jono Hirst on Unsplash

Thoughtless Vulnerability Reporting

The Colombian Foreign Ministry faced a big trouble


Here I give you an overview of the recent Colombian Foreign Ministry's security problem and the...



Photo by Chase Moyer on Unsplash

Tribe of Hackers Red Team 4.0

Learning from the red team expert 'Tinker Secor'


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Dorinel Panaite on Unsplash

Tribe of Hackers Red Team 3.0

Learning from the red team expert Georgia Weidman


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Manyu Varma on Unsplash

Tribe of Hackers Red Team 2.0

Learning from the red team expert Benjamin Donnelly


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (III)

Glimpsing the trends for 2021


In this final part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (II)

Current trends in prevention


In this second part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Lucas Benjamin on Unsplash

Tribe of Hackers Red Team 1.0

Learning from the Red Team Expert Marcus J. Carey


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Photo by Charles Deluvio on Unsplash

Always 100% Ready for Remote Work

The product of a valuable effort over ten years ago


Here is an overview of what our technological architecture and our way of operation are, which...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...




Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.