Opinions

Read our or other experts' take on cybersecurity topics, such as trends, technology, certifications and ethical hacking.

Photo by Jez Timms on Unsplash

Jason Chavarría


Threat landscape and cybersecurity trends we anticipate

Get an idea of the top threats to cybersecurity and preventive trends that we predict for 2024.

Photo by cdd20 on Unsplash

Jason Chavarría


Impacts of false positives by security software

Losing time on false positives lowers devs' morale, costs money and prevents security teams from responding to real risks. We give details and recommendations.

Photo by Gary Bendig on Unsplash

Jason Chavarría


Top cyberattack and prevention trends this year

Fluid Attacks shares a digest of top trends in cyberattacks and prevention in 2023.

Photo by Michael Dziedzic on Unsplash

Andres Roldan


An OffSec Exploitation Expert review

In this post, we review the EXP-401 course and OSEE certification offered by OffSec.

Photo by Saad Chaudhry on Unsplash

Jason Chavarría


Increase the board's cyber savvy with these reads

Boards need to gain skills to identify, assess and supervise their organizations' cyber risk-management measures. We share resources to help them on their way.

Photo by Denis Tuksar on Unsplash

Jason Chavarría


There's not an only way but here's a good one

We offer a guide to become an ethical hacker based off some information on common non-technical and technical skills hackers find useful for their role.

Photo by Sven Mieke on Unsplash

Andres Roldan


A hacker's view of the performance of Researcher CNAs

We've been a CNA for a while, and this is an analysis of our performance.

Photo by Phil Hearing on Unsplash

Jason Chavarría


Why so many are switching to Rust

Memory-related security issues are common and often critical. To reduce their presence, ongoing projects are writing in memory-safe languages like Rust.

Photo by Rohit Tandon on Unsplash

Felipe Ruiz


Description and critique of CEH certifications

Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.