Photo by Charles Deluvio on Unsplash

"No, We Won't Get Hacked!"

And, "of course, I can always protect my company."


In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...



Photo by Lucas Benjamin on Unsplash

Tribe of Hackers Red Team 1.0

Learning from the Red Team Expert Marcus J. Carey


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing


This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment


This post is based on the information given on February 7th by Sylvester, from Lumu, in his...



Photo by Erda Estremera on Unsplash

Opening the Program's Box

General ideas about Software Reverse Engineering


Here we review some basic concepts of reverse engineering within information technology and...



Photo by Terry Vlisidis on Unsplash

Penetration Testing as a Service

NetSPI's 'advice': better platforms for PTaaS


This blog post is based on the webinar 'Scaling Your Security Program with Penetration Testing...



Photo by Sharon McCutcheon on Unsplash

Your Files Have Been Encrypted!

Some pieces of information about ransomware attacks


Everyone could be a target for ransomware attacks. Here we give an introduction to this topic...



Photo by Arteum.ro on Unsplash

Caution! Your Password Can Be Mine

A very short introduction to password cracking


After I wrote this post, I decided to change some of my most important passwords, and after you...



Yellow police line tape on Unsplash: https://unsplash.com/photos/jM6Y2nhsAtk

Do Not Read This Post

What if this post were a malicious link?


In this post, we'll look into the behavior trends of developers when including security in their...



Photo by su fu on Unsplash

The Infinite Monkey Fuzzer

Fuzz testing using American Fuzzy Lop


In this blog post, we are focused on how to perform basic fuzz attacks on desktop Linux C...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy