Bookshelf with some books

Learning How to Code

A chat with Ricardo Yepes. Part 2


In this post, the second part of our interview with Ricardo Yepes, we address topics such as...



Bookshelf with some books

We Need More Training in Basics

A chat with Ricardo Yepes. Part 1.


We spoke to the DevOps engineer Ricardo Yepes recently, and he shared his current vision of...



Photo by KP Bodenstein on Unsplash: https://unsplash.com/photos/ElQI4kGSbiw

Fool the Machine

Trick neural network classifiers


You'll see how to create images that fool classifiers into thinking they see the wrong object...



Toasting Marshmallow. Photo by hcmorr on Unsplash: https://unsplash.com/photos/qlHRuDvaxL8

Roasting Kerberos

Attacking a DC using kerberoast


Windows Active Directory works using the Kerberos protocol, and in this blog post, we detail how...



Git. Photo by Yancy Min on Unsplash: https://unsplash.com/photos/842ofHC6MaI/

Big Code

Learning from open source


Here we'll see how DeepCode works. It has a lot of potential for identifying bugs in your code...



Photo by Andres Urena on Unsplash. Credits: https://unsplash.com/photos/k1osF_h2fzA

Natural Code

Natural language processing for code security


In this blog post, we present the use of Natural Language Processing in bug finding and coding...



handshake

A Conflict of Interest?

You probably don’t see it.


In cybersecurity, there's plenty of opportunities for Conflicts of Interest to emerge. Here we...



Nicolás Acosta, CISO at Corona

Sensible About Cybersecurity

An interview with Nicolás A. CISO at Corona. Part II.


In the second part of our interview with Nicolás Acosta, he shared his perspective on risk...



New York City Skyline

Querier Writeup

How to solve HTB Querier


Here we explain how to use Querier's insecure configurations to gain system access, and how to...



Nicolás Acosta, CISO at Corona

Innovation More Understandable


Nicolás Acosta, CISO of Corona, shared his perspective on topics like artificial intelligence,...



People manipulation

Attacking the Weakest Link

Attacking without borders


Humans are and always will be the weakest link in security. Learn how to deal with these kinds...



Choices. Photo by Nathan Dumlao on Unsplash: https://unsplash.com/photos/pMW4jzELQCw

Risk Indicator Roundup

A matter of taste


Here we compare risk indicators used in quantitative finance, giving their pros and cons. Most...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy