Author:
Julian Arango
Category:
techniques
Tags:
cybersecurity,
trends,
mistake,
technology,
economics,
information
Earlier, we criticized some 'trends' in cybersecurity. Now, we discuss why some cybersecurity...
Author:
Felipe Ruiz
Category:
opinions
Tags:
fuzzing,
cybersecurity,
security-testing,
hacking,
vulnerability,
business
This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...
Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do...
Author:
Julian Arango
Category:
interview
Tags:
machine-learning,
cybersecurity,
security,
interview,
risk,
software
We had the pleasure of chatting with Daniel Correa, a Security Expert who shared his views on...
Author:
Julian Arango
Category:
techniques
Tags:
cybersecurity,
trends,
mistake,
technology,
economics,
information
In this post, we review some cybersecurity trends published online. We discuss why it is a good...
Author:
Felipe Ruiz
Category:
techniques
Tags:
social-engineering,
information,
web,
software,
cybersecurity,
business
In this post, we give some general ideas about phishing, hoping to contribute to its prevention.
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
security-testing,
pentesting,
vulnerability,
hacking,
business
This post is based on the information given on February 7th by Sylvester, from Lumu, in his...
Author:
Felipe Ruiz
Category:
techniques
Tags:
revert,
software,
engineering,
security,
vulnerability,
hacking
Here we review some basic concepts of reverse engineering within information technology and...
Author:
Felipe Ruiz
Category:
opinions
Tags:
security-testing,
vulnerability,
hacking,
software,
company,
business
This blog post is based on the webinar 'Scaling Your Security Program with Penetration Testing...
Author:
Julian Arango
Category:
attacks
Tags:
security,
risk,
vulnerability,
business,
policies,
economics
Here we conclude our review of 'Measuring the cost of cybercrime' by focusing, among other...
Here's a reflection on the need to represent code before actually feeding it into neural network...
Everyone could be a target for ransomware attacks. Here we give an introduction to this topic...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.