Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Photo by Guido Hofmann on Unsplash

Babuk Locker for the 2021

The first ransomware (as a gift) for this new year


Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...



Photo by Chase Moyer on Unsplash

Tribe of Hackers Red Team 4.0

Learning from the red team expert 'Tinker Secor'


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Dorinel Panaite on Unsplash

Tribe of Hackers Red Team 3.0

Learning from the red team expert Georgia Weidman


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by eberhard grossgasteiger on Unsplash

I Saw Your Data on the Dark Web

What is the Dark Web and what do we find there?


I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we...



Photo by Manyu Varma on Unsplash

Tribe of Hackers Red Team 2.0

Learning from the red team expert Benjamin Donnelly


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Daniel McCullough on Unsplash

Interview With Safety Detectives

Mauricio Gomez talking about Fluid Attacks


Mauricio Gomez, a co-founder of Fluid Attacks, recently had an interview with Aviva Zacks of...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (III)

Glimpsing the trends for 2021


In this final part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (II)

Current trends in prevention


In this second part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Karsten Winegeart on Unsplash

Secure Just by Being in a Cave?

Security of OSS — Fluid Attacks as a vivid example


We want to remind you that hiding your applications' source code can often provide you only an...



Photo by Joanna Kosinska on Unsplash

Cybersecurity as Strategy

Strategize with cybersecurity and avoid losses


A recently published article calls to elevate cybersecurity from operational to a strategic...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.