Posts with this tag address situations in which credentials or passwords were or may be compromised and what the best practices are for managing them.

Photo by Ray Hennessy on Unsplash

Felipe Ruiz

Let's rather say a bunch of breaches in a single box

They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Photo by Aaron Burden on Unsplash

Jason Chavarría

Among exposed were secrets, code and AI training data

We describe the leak and mention its causes and threats, talk about the possible security risks when using Azure SAS tokens and give advice to prevent leaks.

Photo by Snowscat on Unsplash

Jason Chavarría

Toyota's ancient and recently disclosed data leaks

We describe the data leaks recently disclosed by Toyota Motor Corporation lasting five, eight and ten years.

Photo by Pierre Bamin on Unsplash

Felipe Ruiz

Watch out for keylogging/keyloggers

Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Photo by Jelleke Vanooteghem on Unsplash

Felipe Ruiz

Benefits and risks of these increasingly used programs

We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Photo by Jez Timms on Unsplash

Jason Chavarría

How does this clever Linux Trojan operate?

Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Photo by Jametlene Reskp on Unsplash

Jason Chavarría

Insider attack suspect was arrested this month

An individual was arrested for extorting Ubiquiti, the company where he worked as a developer. In this post, we narrate the key points of his attack.

Photo by Anil Xavier on Unsplash

Jason Chavarría

Here's what happened this year, in case you missed it

Supply chain attacks, ransomware and data leaks: We give you a short summary of the major cyberattacks of 2021.

Photo by Chaos Soccer Gear on Unsplash

Jason Chavarría

All of Argentina's population IDs stolen and for sale?

This new leak may compromise more than 45M people. Read this post to learn who the attacker is, how he gained access and his connection with past leaks.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.