Company

Posts with this tag address organizational security breach events and news that may be valuable for business cybersecurity.

Photo by Kenrick Mills on Unsplash

Felipe Ruiz


On-premises or in the cloud, security is your concern

We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.

Photo by Eduardo Balderas on Unsplash

Jason Chavarría


Understanding 51 new PCI DSS requirements made easy

PCI DSS v4.0 brings 51 new requirements that are best practices until March 2025. We share a classification that may help take it all in.

Photo by Jeremy Perkins on Unsplash

Jason Chavarría


Comply with the new requirements due for March 2024

Companies that store, handle or transfer account data must comply with PCI DSS v4.0 from March 31. We summarize its 13 new requirements to be met on that date.

Photo by Jez Timms on Unsplash

Jason Chavarría


Threat landscape and cybersecurity trends we anticipate

Get an idea of the top threats to cybersecurity and preventive trends that we predict for 2024.

Photo by Gary Bendig on Unsplash

Jason Chavarría


Top cyberattack and prevention trends this year

Fluid Attacks shares a digest of top trends in cyberattacks and prevention in 2023.

Photo by Aaron Burden on Unsplash

Jason Chavarría


Among exposed were secrets, code and AI training data

We describe the leak and mention its causes and threats, talk about the possible security risks when using Azure SAS tokens and give advice to prevent leaks.

Photo by Michael Dziedzic on Unsplash

Andres Roldan


An OffSec Exploitation Expert review

In this post, we review the EXP-401 course and OSEE certification offered by OffSec.

Photo by Google DeepMind on Unsplash

Felipe Ruiz


Towards an approach that engages more than SCA and SBOM

Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.

Photo by Sara Kurfeß on Unsplash

Felipe Ruiz


A brief overview of this recent EU draft regulation

Learn about the draft Cyber Resilience Act, including its purposes, obligations and penalties, before its final version comes.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.