Photo by James Pond on Unsplash

Schrems Trampled on the Shield

The EU-US Privacy Shield agreement is now invalid


This blog post might give you a better understanding of what has been achieved by Max Schrems...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Photo by Michael Fenton on Unsplash

Breaking Down DevOps

The central components of DevOps definition


Here we introduce DevOps, a working methodology whose principles are communication,...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Bradley Feller on Unsplash

We've Reached a New Standard

More requirements in Rules are firmly supported


Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...



Photo by Charles Deluvio on Unsplash

Always 100% Ready for Remote Work

The product of a valuable effort over ten years ago


Here is an overview of what our technological architecture and our way of operation are, which...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Photo by Matthew Henry on Unsplash

Happening Now: Trends 2020

More realistic cybersecurity predictions


Earlier, we criticized some 'trends' in cybersecurity. Now, we discuss why some cybersecurity...



Photo by Oleg Laptev on Unsplash

Cybersecurity Trends 2020? F*ck...

Fear will drive cybersecurity spending. Dear lord...


In this post, we review some cybersecurity trends published online. We discuss why it is a good...



Photo by Glen Hooper on Unsplash

Trust Nothing, Verify Everything

Sharing at least a modicum about phishing attacks


In this post, we give some general ideas about phishing, hoping to contribute to its prevention.



People manipulation

Attacking the Weakest Link

Attacking without borders


Humans are and always will be the weakest link in security. Learn how to deal with these kinds...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy