You'll see how to create images that fool classifiers into thinking they see the wrong object...
Windows Active Directory works using the Kerberos protocol, and in this blog post, we detail how...
Here we'll see how DeepCode works. It has a lot of potential for identifying bugs in your code...
In this blog post, we present the use of Natural Language Processing in bug finding and coding...
Author:
Julian Arango
Category:
attacks
Tags:
challenge,
business,
ethical-hacking,
pentesting,
security
In cybersecurity, there's plenty of opportunities for Conflicts of Interest to emerge. Here we...
In the second part of our interview with Nicolás Acosta, he shared his perspective on risk...
Here we explain how to use Querier's insecure configurations to gain system access, and how to...
Nicolás Acosta, CISO of Corona, shared his perspective on topics like artificial intelligence,...
Author:
Mateo Gutiérrez Gómez
Category:
social engineering
Humans are and always will be the weakest link in security. Learn how to deal with these kinds...
Here we compare risk indicators used in quantitative finance, giving their pros and cons. Most...
For this post, we spoke with Andrés Gómez, a former Fluid Attacks' member, who is researching to...
For this blog post, we rely on the following question: Why does Asserts use parser combinators...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.