Cybersecurity

Posts with this tag cover practices and technologies used to protect the computer systems and sensitive data of organizations and their users from cyberattacks.

Photo by Michael Dziedzic on Unsplash

Andres Roldan


An OffSec Exploitation Expert review

In this post, we review the EXP-401 course and OSEE certification offered by OffSec.

Photo by Dave Photoz on Unsplash

Jason Chavarría


An interview with members of our hacking team

Members of our hacking team who took part in the International Cybersecurity Challenge tell us what the hardest part was, their recommendations, and more.

Photo by Sara Kurfeß on Unsplash

Felipe Ruiz


A brief overview of this recent EU draft regulation

Learn about the draft Cyber Resilience Act, including its purposes, obligations and penalties, before its final version comes.

Photo by Saad Chaudhry on Unsplash

Jason Chavarría


Increase the board's cyber savvy with these reads

Boards need to gain skills to identify, assess and supervise their organizations' cyber risk-management measures. We share resources to help them on their way.

Photo by Ugur Arpaci on Unsplash

Felipe Ruiz


Soon it will be a must in cybersecurity due to NIS2

We briefly introduce the NIS 2 Directive and pay special attention to its cybersecurity training requirement for organizations' boards of directors.

Photo by Snowscat on Unsplash

Jason Chavarría


Toyota's ancient and recently disclosed data leaks

We describe the data leaks recently disclosed by Toyota Motor Corporation lasting five, eight and ten years.

Photo by Pierre Bamin on Unsplash

Felipe Ruiz


Watch out for keylogging/keyloggers

Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Photo by Denis Tuksar on Unsplash

Jason Chavarría


There's not an only way but here's a good one

We offer a guide to become an ethical hacker based off some information on common non-technical and technical skills hackers find useful for their role.

Photo by Jelleke Vanooteghem on Unsplash

Felipe Ruiz


Benefits and risks of these increasingly used programs

We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.