Photo by Barefoot Communications on Unsplash

Familiar With Facebook Data Leak?

About 533 million user phone numbers now for 'free'


This post outlines the most recent Facebook data leak with approximately 533 million records,...



Photo by Jonathan Petersson on Unsplash

Tribe of Hackers Red Team 5.0

Learning from the red team expert Carlos Perez


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Joshua Sukoff on Unsplash

What's in the FBI's 2020 Report?

Get a digest of Internet crime over the last year


This post gives you an overview of the FBI's 2020 Internet Crime Report, based on the activity...



Photo by Alejandro Luengo on Unsplash

Microsoft Exchange Server Hack

Hafnium exploits four zero-day vulnerabilities


This post describes the Microsoft Exchange Server hack that has affected multiple companies and...



Photo by Christopher Skor on Unsplash

Time for the U.S. to Strike Back?

SolarWinds could be the start of a U.S.-Russia cyberwar


Here you can find experts' opinions about the SolarWinds attack and some suggestions that could...



Photo by Shannon Litt on Unsplash

Sudo Heap Overflow CVE-2021-3156

Replicating CVE-2021-3156 with AFL


In this article we will be able to reproduce the bug described on CVE-2021-3156 using fuzzing.



Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Photo by Guido Hofmann on Unsplash

Babuk Locker for the 2021

The first ransomware (as a gift) for this new year


Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...



Photo by Chase Moyer on Unsplash

Tribe of Hackers Red Team 4.0

Learning from the red team expert 'Tinker Secor'


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Dorinel Panaite on Unsplash

Tribe of Hackers Red Team 3.0

Learning from the red team expert Georgia Weidman


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Manyu Varma on Unsplash

Tribe of Hackers Red Team 2.0

Learning from the red team expert Benjamin Donnelly


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.