Philosophy

Entries where we describe security best practices and approaches, tackling basic, as well as trending, cybersecurity concepts.

Photo by Kenrick Mills on Unsplash

Felipe Ruiz


On-premises or in the cloud, security is your concern

We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.

Photo by Mike Lewinski on Unsplash

Felipe Ruiz


It's about time you relied on code-assisted pentesting

Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.

Photo by Fervent Jant on Unsplash

Felipe Ruiz


NIST sheds light on the classification of attacks on AI

Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.

Photo by Peter Neumann on Unsplash

Jason Chavarría


Importance, types, steps, tools of pentesting, and more

Explore the world of penetration testing and gain understanding of how it bolsters your cybersecurity safeguards against emerging threats.

Photo by Erzsébet Vehofsics on Unsplash

Jason Chavarría


Learn the types, tools, techniques, principles and more

We define security testing and tell you all the basics. These include how to perform it to find vulnerabilities in software applications and other systems.

Photo by engin akyurt on Unsplash

Felipe Ruiz


Outstanding incidents of this type of crime since 2011

Discover some of the most notorious crypto crimes to date, among which we present not only software cyberattacks but also tremendous scams.

Photo by Bastian Riccardi on Unsplash

Felipe Ruiz


Introduction to a trend of just over a decade ago

We share basic knowledge about cryptocurrency and related concepts, including crypto crime, a worrying issue that has gone hand in hand with that paradigm.

Photo by Google DeepMind on Unsplash

Felipe Ruiz


Towards an approach that engages more than SCA and SBOM

Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.

Photo by David Ramírez on Unsplash

Jason Chavarría


Or what makes the ethical hacker

If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.