Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Photo by Guido Hofmann on Unsplash

Babuk Locker for the 2021

The first ransomware (as a gift) for this new year


Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...



Photo by Chase Moyer on Unsplash

Tribe of Hackers Red Team 4.0

Learning from the red team expert 'Tinker Secor'


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Dorinel Panaite on Unsplash

Tribe of Hackers Red Team 3.0

Learning from the red team expert Georgia Weidman


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Manyu Varma on Unsplash

Tribe of Hackers Red Team 2.0

Learning from the red team expert Benjamin Donnelly


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Joanna Kosinska on Unsplash

Cybersecurity as Strategy

Strategize with cybersecurity and avoid losses


A recently published article calls to elevate cybersecurity from operational to a strategic...



Photo by Charles Deluvio on Unsplash

"No, We Won't Get Hacked!"

And, "of course, I can always protect my company."


In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...



Photo by Lucas Benjamin on Unsplash

Tribe of Hackers Red Team 1.0

Learning from the Red Team Expert Marcus J. Carey


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing


This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment


This post is based on the information given on February 7th by Sylvester, from Lumu, in his...



Photo by Erda Estremera on Unsplash

Opening the Program's Box

General ideas about Software Reverse Engineering


Here we review some basic concepts of reverse engineering within information technology and...




Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.