Rubber duckies

Understanding Program Semantics

With symbolic execution

Here's a reflection on the need to represent code before actually feeding it into neural network...

Photo by Sharon McCutcheon on Unsplash

Your Files Have Been Encrypted!

Some pieces of information about ransomware attacks

Everyone could be a target for ransomware attacks. Here we give an introduction to this topic...

Book in two languages

Can Code Be translated?

From code to words

Here we talk about Code2seq, which differs in adapting neural machine translation techniques to...

Photo by Andre Benz on Unsplash

Evolution of Cybercrime Costs (I)

Impact of cybercrime today portrays a new landscape

In 2012, the study ‘Measuring the cost of cybercrime’ was presented at the WEIS. Here we...

Target and darts

Further Down Code2vec

Vector representations of code

Here is a tutorial on the usage of code2vec to predict method names, determine the accuracy of...

Photo by on Unsplash

Caution! Your Password Can Be Mine

A very short introduction to password cracking

After I wrote this post, I decided to change some of my most important passwords, and after you...

Photo by NeONBRAND on unplash:

Bankrupt by Wrong Cybersecurity!

How some firms (especially SMBs) can go broke

Do companies go bankrupt by a cybersecurity breach? Some people assure there is no evidence...

Arrows vector field

Embedding Code Into Vectors

Vector representations of code

Here we discuss code2vec relation with word2vec and autoencoders to grasp better how feasible it...

Photo by Franck V. on Unsplash:

The Vectors of Language

Distributed representations of natural language

This post is an overview of word2vec, a method for obtaining vectors that represent natural...

Man sitting facing laptop. Photo by Clint Patterson on Unsplash:

How to Pass the OSCP

The meaning of Try Harder

The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...

Broken blue ceramic plate on Unsplash:

Debug Like a Boss

Should CEOs discuss software defects?

Software quality management, including security weaknesses, has become of strategic relevance....

Mobile showing statistics. Photo by Austin Distel on Unsplash:

Battle Tendency

Most relevant IT investments in 2019

In this article, we discuss our research into the most relevant investments and budgets related...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy