Photo by Charles Deluvio on Unsplash

Security Breaches Are Your Fault!

Confusion with the cloud shared responsibility model


Do you know what is happening with those who don't understand the cloud security shared...



Photo by Guido Hofmann on Unsplash

Babuk Locker for the 2021

The first ransomware (as a gift) for this new year


Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...



Photo by eberhard grossgasteiger on Unsplash

I Saw Your Data on the Dark Web

What is the Dark Web and what do we find there?


I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we...



Photo by Daniel McCullough on Unsplash

Interview With Safety Detectives

Mauricio Gomez talking about Fluid Attacks


Mauricio Gomez, a co-founder of Fluid Attacks, recently had an interview with Aviva Zacks of...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (III)

Glimpsing the trends for 2021


In this final part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (II)

Current trends in prevention


In this second part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Karsten Winegeart on Unsplash

Secure Just by Being in a Cave?

Security of OSS — Fluid Attacks as a vivid example


We want to remind you that hiding your applications' source code can often provide you only an...



Photo by visuals on Unsplash

Online Voting for a New President?

The trouble with OmniBallot and other voting platforms


In this post, we show you the exposed vulnerabilities of one of the many online voting options...



Photo by Gary Bendig on Unsplash

A New Red Team Expert

A short interview with Daniel Yepes


We talked to Daniel Yepes, a colleague who recently achieved his certificate as a Red Team...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Kuma Kum on Unsplash

Manual SQLi Bypass

Bypassing SQLi filters manually


SQL injection can be one of the most dangerous vulnerabilities. Here we will see how to bypass...



1 2 3 4 5 6 >

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.