
Felipe Ruiz
A zero-day vulnerability in tj-actions/changed-files
GitHub Action breach! Learn how tj-actions/changed-files leaked secrets & how to protect your repos. Read our breakdown.

Felipe Ruiz
Towards enhanced vulnerability prioritization
In this blog post, you will learn about reachability analysis, a software assessment technique that helps to prioritize vulnerabilities for their remediation.

Juan Díaz
How we enhance our tests by standardizing them
At Fluid Attacks, we built an internal testing framework to improve our tests in Python. Let's talk about our motivation and results.

Daniel Salazar
Our new testing architecture for software development
Learn about how we test our platform, the pain points we faced in the past, and a new architecture that improves our testing quality and development experience.

Wendy Rodriguez
How it works and how it improves your security posture
This proactive approach helps ensure applications, sensitive data and cloud infrastructure remain secure, compliant and resilient.

Wendy Rodriguez
Sophisticated web-based attacks and proactive measures
Discover top web application security threats and how attackers exploit them. Also, read about effective strategies developers can use to protect their apps.

Wendy Rodriguez
The importance of API security in this app-driven world
Developers are facing challenges in API security. We’re here to help them build secure, reliable apps with these best practices.

Wendy Rodriguez
Protecting your cloud-based apps from cyber threats
Enhance your Software-as-a-service security knowledge with key strategies to protect your cloud applications against cyber threats.

Wendy Rodriguez
Details on this trend and related data privacy concerns
As open banking reshapes the industry, banks are met with new concerns. Check the benefits, risks and proactive measures we offer to secure sensitive data.