Numbers notes on Unsplash:

Monetizing Vulnerabilities

From probabilites to dollars and cents

Here we work using calibrated estimates to run a Monte Carlo simulation to obtain the expected...

Risky poker move. Credits:

Quantifying Risk

From color scales to probabilities and ranges

Here we discuss a survey of probabilistic methods that can be applied to quantify cybersecurity...

Binary machine learning. Credits:

Binary Learning

Learning to exploit binaries

In this article, we describe a system named VDiscover, created from the ground up to learn...

Depiction of a deep neural network. Credits:

Deep Hacking

Deep learning for vulnerability discovery

Here we describe the first systematic framework for using deep learning to detect...

Executive leaking business information

Attacking Without Announce

Nobody knows, but everything is allowed

We want to guide you about some management policies we suggest that you could take to answer...

Cats in a forest

Don't Let the Cat Out!

Trapdoor functions and their importance in security

This blog post is an overview of the mathematical concept 'Trapdoor,' the basis of information security.

Fluid Attacks, Among the Top Global Leaders 2018

Among the Top Global Leaders 2018

Fluid Attacks, a top cybersecurity company

Fluid Attacks was recognized as a global leader in the Cybersecurity category by Clutch, as one...

The actual serial killer doll

The Anomaly Serial Killer Doll

Hunting missing checks with anomaly detection

Here we describe the system Chucky, which applies machine learning and natural language...

Screen showing source code

Exploiting Code Graphs

Mining graph representations for vulnerabilities

In this post, we introduce Yamaguchi's concept of code property graphs, how to traverse them,...

Robot playing the piano

Crash Course in Machine Learning

A survey of machine learning algorithms

In this article, we give a high-level view of each of the most important ML algorithms that have...

greek statue with small angels.

Asymmetric DoS, Slow HTTP Attack

The story of David and Goliath

Here you'll learn how a slow HTTP attack works, how to inspect HTTP requests and responses, and...

Can machines learn to hack?

Machine-Learning to Hack

Machine learning for vulnerability discovery

This post is a bird's eye view of machine learning techniques applied to vulnerability discovery...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy