Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...



Photo by camilo jimenez on Unsplash: https://unsplash.com/photos/vGu08RYjO-s

Triage for Hackers

Prioritize code auditing via ML


This post is a high-level review of our previous discussion concerning machine learning...



Multicolored hallway. Photo by Efe Kurnaz on Unsplash: https://unsplash.com/photos/RnCPiXixooY

Do We Need a Purple Team?

Understanding Purple Teams


In this blog, we discuss the fundamentals of Purple Teams and possible ways to implement them in...



Photo by Rishi Deep on Unsplash: https://unsplash.com/photos/WiCvC9u7OpE

Vulnerability Classifier

A pipeline to classify vulnerable code


Here is a simple attempt to define a vulnerability classifier using categorical encoding and a...



Screen showing performance stats. Photo by Stephen Dawson on Unsplash: https://unsplash.com/photos/qwtCeJ5cLYs

Security in Trends

Cybersecurity risks in technology trends


In this article, we discuss the main cybersecurity trends for 2019, how to keep your company...



Computer showing a graph

Digression to Regression

Simple linear regression in scikit


In this post, we begin to tackle why vectors are the most appropriate representation for data as...



Photo by NESA by Makers on Unsplash

Sastisfying App Security

An introduction to SAST


This blog post is an introduction to SAST. We share the concept, how SAST works, its types,...



Photo by Franki Chamaki on Unsplash

Vulnerabilities in Deep Learning

Deep Learning for vulnerability disclosure


In this blog post, we discuss an article from Boston University that presents new applications...



Foosball red vs blue. Photo by Stefan Steinbauer on Unsplash: https://unsplash.com/photos/va-B5dBbpr4

Red Team Exercise

What is a Red Team exercise?


Here we give the reader a general context about what a Red Team does and the main strategy used...



Digital heart beat monitor on Unsplash https://unsplash.com/photos/0lrJo37r6Nk

HealthTech Protection

How healthcare breakthroughs could help cybersecurity


In this blog post, we explore how simple yet incredibly effective healthcare practices could...



Person using a Syringe filled with bad stuff

Tainted Love

It's all about sanitization


This blog post provides a brief description of static and dynamic taint analysis or taint checking.



CPU Usage. Photo by Alberto Duo on Unsplash: https://unsplash.com/photos/e4rcg33x4fA

Cryptojacking, a Real Malware?

Understanding cryptojacking "malware"


Here we'll explain the different types of cryptojacking and give an example. We'll also discuss...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy