This post is a high-level review of our previous discussion concerning machine learning...
In this blog, we discuss the fundamentals of Purple Teams and possible ways to implement them in...
Here is a simple attempt to define a vulnerability classifier using categorical encoding and a...
In this article, we discuss the main cybersecurity trends for 2019, how to keep your company...
In this post, we begin to tackle why vectors are the most appropriate representation for data as...
This blog post is an introduction to SAST. We share the concept, how SAST works, its types,...
In this blog post, we discuss an article from Boston University that presents new applications...
Here we give the reader a general context about what a Red Team does and the main strategy used...
In this blog post, we explore how simple yet incredibly effective healthcare practices could...
This blog post provides a brief description of static and dynamic taint analysis or taint checking.
Here we'll explain the different types of cryptojacking and give an example. We'll also discuss...
In this post, the second part of our interview with Ricardo Yepes, we address topics such as...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.