Posts with this tag address situations in which credentials or passwords were or may be compromised and what the best practices are for managing them.

Photo by Snowscat on Unsplash

Jason Chavarría

Toyota's ancient and recently disclosed data leaks

We describe the data leaks recently disclosed by Toyota Motor Corporation lasting five, eight and ten years.

Photo by Pierre Bamin on Unsplash

Felipe Ruiz

Watch out for keylogging/keyloggers

Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Photo by Jelleke Vanooteghem on Unsplash

Felipe Ruiz

Benefits and risks of these increasingly used programs

We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Photo by Jez Timms on Unsplash

Jason Chavarría

How does this clever Linux Trojan operate?

Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Photo by Jametlene Reskp on Unsplash

Jason Chavarría

Insider attack suspect was arrested this month

An individual was arrested for extorting Ubiquiti, the company where he worked as a developer. In this post, we narrate the key points of his attack.

Photo by Anil Xavier on Unsplash

Jason Chavarría

Here's what happened this year, in case you missed it

Supply chain attacks, ransomware and data leaks: We give you a short summary of the major cyberattacks of 2021.

Photo by Chaos Soccer Gear on Unsplash

Jason Chavarría

All of Argentina's population IDs stolen and for sale?

This new leak may compromise more than 45M people. Read this post to learn who the attacker is, how he gained access and his connection with past leaks.

Photo by Markus Winkler on Unsplash

Jason Chavarría

Android devices are catching FluBot and TangleBot

Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

Photo by eberhard grossgasteiger on Unsplash

Felipe Ruiz

What is the Dark Web and what do we find there?

I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we can find within it.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.