Photo by Barefoot Communications on Unsplash

Facebook Data Leak? Again?

About 533 million user phone numbers now for 'free'


This post outlines the most recent Facebook data leak with approximately 533 million records,...



Photo by Alejandro Luengo on Unsplash

Microsoft Exchange Server Hack

Hafnium exploits four zero-day vulnerabilities


This post describes the Microsoft Exchange Server hack that has affected multiple companies and...



Photo by Christopher Skor on Unsplash

Time for the U.S. to Strike Back?

SolarWinds could be the start of a U.S.-Russia cyberwar


Here you can find experts' opinions about the SolarWinds attack and some suggestions that could...



Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Photo by Cookie the Pom on Unsplash

My Favorite Password: '123456'

You could be a victim of Credential Stuffing


I wrote this post to give you an overview of the Credential Stuffing attack and some short...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...



Robot playing the piano

Crash Course in Machine Learning

A survey of machine learning algorithms


In this article, we give a high-level view of each of the most important ML algorithms that have...



Cup with message in front of screen with code

Functional Fashion in JavaScript

Functional programming in JavaScript


Here we talk about some first steps in functional JavaScript and recommendations for migration....



Snake checking a code

Are You Checking Types?

Static type checking with mypy


What are the potential problems of untyped objects in Python? Here we work on the importance of...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.