Author:
Felipe Ruiz
Category:
philosophy
Tags:
cloud,
information,
cybersecurity,
security,
mistake,
company
Do you know what is happening with those who don't understand the cloud security shared...
Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...
Author:
Felipe Ruiz
Category:
philosophy
Tags:
web,
information,
credential,
password,
security,
cybersecurity
I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we...
Author:
Felipe Ruiz
Category:
interview
Tags:
security,
cybersecurity,
interview,
red-team,
vulnerability,
ethical-hacking
Mauricio Gomez, a co-founder of Fluid Attacks, recently had an interview with Aviva Zacks of...
Author:
Felipe Ruiz
Category:
opinions
Tags:
security,
cybersecurity,
trends,
security-testing,
technology,
company
In this final part of the state of cybersecurity 2020-21, we want to share with you some...
Author:
Felipe Ruiz
Category:
opinions
Tags:
security,
cybersecurity,
trends,
security-testing,
technology,
company
In this second part of the state of cybersecurity 2020-21, we want to share with you some...
Author:
Felipe Ruiz
Category:
opinions
Tags:
security,
cybersecurity,
trends,
hacking,
social,
company
In this first part of the state of cybersecurity 2020-21, we want to share with you some...
Author:
Felipe Ruiz
Category:
philosophy
Tags:
security,
cybersecurity,
code,
software,
company,
business
We want to remind you that hiding your applications' source code can often provide you only an...
Author:
Felipe Ruiz
Category:
politics
Tags:
security,
cybersecurity,
software,
web,
vulnerability,
risk
In this post, we show you the exposed vulnerabilities of one of the many online voting options...
Author:
Felipe Ruiz
Category:
interview
Tags:
interview,
red-team,
windows,
software,
cybersecurity,
security
We talked to Daniel Yepes, a colleague who recently achieved his certificate as a Red Team...
Here you'll learn about Security champions. But first, we give you five recommendations if...
SQL injection can be one of the most dangerous vulnerabilities. Here we will see how to bypass...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.