Photo by Joshua Sukoff on Unsplash

What's in the FBI's 2020 Report?

Get a digest of Internet crime over the last year


This post gives you an overview of the FBI's 2020 Internet Crime Report, based on the activity...



Photo by Bradley Feller on Unsplash

We've Reached a New Standard

More requirements in Rules are firmly supported


Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...



Computer with do what is great sign.

Git on Steroids

From messy logs to Data Analytics


Learn here, among other things, how to define a Git commit message syntax and use real-time...



Cucumber lot

Gherkin on Steroids

How to document detailed attack vectors


In this post, we work on how to use Gherkin to document attack vectors in vulnerable...



Cucumber slices

Is Your App in a Pickle?

Documenting vulnerabilities with gherkin


Gherkin can be used for documentation and automated testing. Here we focus on its basics and how...



Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.