Photo by Daniel McCullough on Unsplash

Interview With Safety Detectives

Mauricio Gomez talking about Fluid Attacks


Mauricio Gomez, a co-founder of Fluid Attacks, recently had an interview with Aviva Zacks of...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (III)

Glimpsing the trends for 2021


In this final part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (II)

Current trends in prevention


In this second part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Karsten Winegeart on Unsplash

Secure Just by Being in a Cave?

Security of OSS — Fluid Attacks as a vivid example


We want to remind you that hiding your applications' source code can often provide you only an...



Photo by visuals on Unsplash

Online Voting for a New President?

The trouble with OmniBallot and other voting platforms


In this post, we show you the exposed vulnerabilities of one of the many online voting options...



Photo by Gary Bendig on Unsplash

A New Red Team Expert

A short interview with Daniel Yepes


We talked to Daniel Yepes, a colleague who recently achieved his certificate as a Red Team...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Kuma Kum on Unsplash

Manual SQLi Bypass

Bypassing SQLi filters manually


SQL injection can be one of the most dangerous vulnerabilities. Here we will see how to bypass...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Blacksmith. Photo by Hannah Gibbs on Unsplash: https://unsplash.com/photos/BINLgyrG_fI

Understanding SSRF

Attacking a web server using SSRF


Here we will see what a Server Side Request Forgery is, how hackers can exploit it, and what are...



Photo by Mick Haupt on Unsplash

Search the History

Searching for credentials in a repository


As everyone knows in our context, production credentials should be protected. In this post, we...



1 2 3 4 5 6 >

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy