Social Engineering

Entries with this tag talk about tactics or incidents where attackers manipulate people to breach system security.

Photo by Pierre Bamin on Unsplash

Felipe Ruiz


Watch out for keylogging/keyloggers

Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Photo by Thomas Griggs on Unsplash

Jason Chavarría


Pentesting is a system-agnostic approach to security

The types of penetration testing include external and internal network, wireless, IoT, mobile application and social engineering pentesting. Learn more here.

Photo by Lucrezia Carnelos on Unsplash

Felipe Ruiz


Chances are you're vulnerable with Microsoft Office

In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.

Photo by Timothy Dykes on Unsplash

Jason Chavarría


Buggy package managers, some only on Windows

Researchers found vulnerabilities in some versions of eight popular package managers. We review how an attacker could exploit them and urge everyone to upgrade.

Photo by engin akyurt on Unsplash

Felipe Ruiz


Highlights since just before the Russian invasion

This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point.

Photo by Markus Spiske on Unsplash

Jason Chavarría


Emotet may be back for the crown as king of malware

Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.

Photo by Andre Mouton on Unsplash

Jason Chavarría


Employees as the strongest link in the security chain

The human-as-a-security-sensor paradigm asserts that catastrophe can be prevented if employees are trained to report threat events promptly. Learn more here.

Photo by Markus Winkler on Unsplash

Jason Chavarría


Android devices are catching FluBot and TangleBot

Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

Photo by Marco Bianchetti on Unsplash

Jason Chavarría


Discover social engineers' weapons of influence

Read this post to learn the psychological tactics used in cyberattacks and what personality traits make targets more (or less) susceptible to fall for them.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.