Author:
Felipe Ruiz
Category:
attacks
Tags:
cybersecurity,
software,
vulnerability,
hacking,
application,
discovery
This post outlines the SolarWinds supply chain attack that has affected multiple companies and...
Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
red team,
hacking,
pentesting,
ethical hacking,
blue team
This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
red team,
hacking,
pentesting,
ethical hacking,
blue team
This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
red team,
hacking,
pentesting,
ethical hacking,
blue team
This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...
Author:
Felipe Ruiz
Category:
opinions
Tags:
security,
cybersecurity,
trends,
hacking,
social,
company
In this first part of the state of cybersecurity 2020-21, we want to share with you some...
Author:
Julian Arango
Category:
philosophy
Tags:
cybersecurity,
mistake,
risk,
business,
company,
hacking
A recently published article calls to elevate cybersecurity from operational to a strategic...
Author:
Julian Arango
Category:
philosophy
Tags:
cybersecurity,
mistake,
risk,
business,
company,
hacking
In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
red team,
hacking,
pentesting,
ethical hacking,
blue team
This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...
Author:
Felipe Ruiz
Category:
opinions
Tags:
fuzzing,
cybersecurity,
security testing,
hacking,
vulnerability,
business
This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
security testing,
pentesting,
vulnerability,
hacking,
business
This post is based on the information given on February 7th by Sylvester, from Lumu, in his...
Author:
Felipe Ruiz
Category:
techniques
Tags:
revert,
software,
engineering,
security,
vulnerability,
hacking
Here we review some basic concepts of reverse engineering within information technology and...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.