Bookshelf with some books

Learning How to Code

A chat with Ricardo Yepes. Part 2

In this post, the second part of our interview with Ricardo Yepes, we address topics such as...

Bookshelf with some books

We Need More Training in Basics

A chat with Ricardo Yepes. Part 1.

We spoke to the DevOps engineer Ricardo Yepes recently, and he shared his current vision of...

Photo by KP Bodenstein on Unsplash:

Fool the Machine

Trick neural network classifiers

You'll see how to create images that fool classifiers into thinking they see the wrong object...

Toasting Marshmallow. Photo by hcmorr on Unsplash:

Roasting Kerberos

Attacking a DC using kerberoast

Windows Active Directory works using the Kerberos protocol, and in this blog post, we detail how...

Git. Photo by Yancy Min on Unsplash:

Big Code

Learning from open source

Here we'll see how DeepCode works. It has a lot of potential for identifying bugs in your code...

Photo by Andres Urena on Unsplash. Credits:

Natural Code

Natural language processing for code security

In this blog post, we present the use of Natural Language Processing in bug finding and coding...


A Conflict of Interest?

You probably don’t see it.

In cybersecurity, there's plenty of opportunities for Conflicts of Interest to emerge. Here we...

Nicolás Acosta, CISO at Corona

Sensible About Cybersecurity

An interview with Nicolás A. CISO at Corona. Part II.

In the second part of our interview with Nicolás Acosta, he shared his perspective on risk...

New York City Skyline

Querier Writeup

How to solve HTB Querier

Here we explain how to use Querier's insecure configurations to gain system access, and how to...

Nicolás Acosta, CISO at Corona

Innovation More Understandable

Nicolás Acosta, CISO of Corona, shared his perspective on topics like artificial intelligence,...

People manipulation

Attacking the Weakest Link

Attacking without borders

Humans are and always will be the weakest link in security. Learn how to deal with these kinds...

Choices. Photo by Nathan Dumlao on Unsplash:

Risk Indicator Roundup

A matter of taste

Here we compare risk indicators used in quantitative finance, giving their pros and cons. Most...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy