Posts with this tag address situations in which credentials or passwords were or may be compromised and what the best practices are for managing them.

Photo by Jez Timms on Unsplash

Jason Chavarría

How does this clever Linux Trojan operate?

Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Photo by Jametlene Reskp on Unsplash

Jason Chavarría

Insider attack suspect was arrested this month

An individual was arrested for extorting Ubiquiti, the company where he worked as a developer. In this post, we narrate the key points of his attack.

Photo by Anil Xavier on Unsplash

Jason Chavarría

Here's what happened this year, in case you missed it

Supply chain attacks, ransomware and data leaks: We give you a short summary of the major cyberattacks of 2021.

Photo by Chaos Soccer Gear on Unsplash

Jason Chavarría

All of Argentina's population IDs stolen and for sale?

This new leak may compromise more than 45M people. Read this post to learn who the attacker is, how he gained access and his connection with past leaks.

Photo by Markus Winkler on Unsplash

Jason Chavarría

Android devices are catching FluBot and TangleBot

Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

Photo by eberhard grossgasteiger on Unsplash

Felipe Ruiz

What is the Dark Web and what do we find there?

I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we can find within it.

Photo by Cookie the Pom on Unsplash

Felipe Ruiz

You could be a victim of Credential Stuffing

I wrote this post to give you an overview of the Credential Stuffing attack and some short recommendations for its prevention.

Photo by Mick Haupt on Unsplash

Jonathan Armas

Searching for credentials in a repository

As everyone knows in our context, production credentials should be protected. In this post, we explain how to extract old credentials and how to protect them.

Photo by Bundo Kim on Unsplash

Jonathan Armas

Attacking a network using Responder

Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do not verify addresses, and here we detail how to exploit this.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.