Risk

Posts with this tag address the possibility of exposure, damage or loss of assets in organizations due to security weaknesses and cyber threats.

Photo by Brian Kelly on Unsplash

Felipe Ruiz


We need you, but we can't give you any money

We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.

Photo by Sean Pollock on Unsplash

Wendy Rodriguez


Data breaches that left their mark on time

A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.

Photo by Roy Muz on Unsplash

Felipe Ruiz


Lessons learned from black swans

There are also "black swans" in cybersecurity. We can run into one of them at any time, so we must be prepared.

Photo by Florian Schmetz on Unsplash

Wendy Rodriguez


The best offense is a good defense

Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act.

Photo by Valery Fedotov on Unsplash

Felipe Ruiz


A digital infrastructure issue that many still ignore

The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.

Photo by Sebastian Pociecha on Unsplash

Wendy Rodriguez


Historic events that will inspire you to act

In this post, we talk about the biggest and most impactful ransomware attacks in history that emphasize the need to take cybersecurity measures.

Photo by A S on Unsplash

Felipe Ruiz


How can we justify the investment in cybersecurity?

While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.

Photo by Pawel Czerwinski on Unsplash

Felipe Ruiz


Attackers can indirectly instruct AI for malicious aims

We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.

Photo by Ray Hennessy on Unsplash

Felipe Ruiz


Let's rather say a bunch of breaches in a single box

They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.