Book in two languages

Can Code Be translated?

From code to words


Here we talk about Code2seq, which differs in adapting neural machine translation techniques to...



Photo by Andre Benz on Unsplash

Evolution of Cybercrime Costs (I)

Impact of cybercrime today portrays a new landscape


In 2012, the study ‘Measuring the cost of cybercrime’ was presented at the WEIS. Here we...



Target and darts

Further Down Code2vec

Vector representations of code


Here is a tutorial on the usage of code2vec to predict method names, determine the accuracy of...



Photo by Arteum.ro on Unsplash

Caution! Your Password Can Be Mine

A very short introduction to password cracking


After I wrote this post, I decided to change some of my most important passwords, and after you...



Photo by NeONBRAND on unplash: https://unsplash.com/photos/dDvrIJbSCkg

Bankrupt by Wrong Cybersecurity!

How some firms (especially SMBs) can go broke


Do companies go bankrupt by a cybersecurity breach? Some people assure there is no evidence...



Arrows vector field

Embedding Code Into Vectors

Vector representations of code


Here we discuss code2vec relation with word2vec and autoencoders to grasp better how feasible it...



Photo by Franck V. on Unsplash: https://unsplash.com/photos/_E1PQXKUkMw

The Vectors of Language

Distributed representations of natural language


This post is an overview of word2vec, a method for obtaining vectors that represent natural...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...



Broken blue ceramic plate on Unsplash: https://unsplash.com/photos/WdJkXFQ4VHY

Debug Like a Boss

Should CEOs discuss software defects?


Software quality management, including security weaknesses, has become of strategic relevance....



Mobile showing statistics. Photo by Austin Distel on Unsplash: https://unsplash.com/photos/EMPZ7yRZoGw

Battle Tendency

Most relevant IT investments in 2019


In this article, we discuss our research into the most relevant investments and budgets related...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...



Photo by camilo jimenez on Unsplash: https://unsplash.com/photos/vGu08RYjO-s

Triage for Hackers

Prioritize code auditing via ML


This post is a high-level review of our previous discussion concerning machine learning...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.