Photo by Barefoot Communications on Unsplash

Facebook Data Leak? Again?

About 533 million user phone numbers now for 'free'


This post outlines the most recent Facebook data leak with approximately 533 million records,...



Photo by Alejandro Luengo on Unsplash

Microsoft Exchange Server Hack

Hafnium exploits four zero-day vulnerabilities


This post describes the Microsoft Exchange Server hack that has affected multiple companies and...



Photo by Christopher Skor on Unsplash

Time for the U.S. to Strike Back?

SolarWinds could be the start of a U.S.-Russia cyberwar


Here you can find experts' opinions about the SolarWinds attack and some suggestions that could...



Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Photo by Guido Hofmann on Unsplash

Babuk Locker for the 2021

The first ransomware (as a gift) for this new year


Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...



Photo by Karsten Winegeart on Unsplash

Secure Just by Being in a Cave?

Security of OSS — Fluid Attacks as a vivid example


We want to remind you that hiding your applications' source code can often provide you only an...



Photo by Clovis WOOD on Unsplash

A Recent OSCE in Our Team

A short interview with Andres Roldan


We spoke with Andres Roldan, our Offensive Team Leader, who recently obtained his OSCE...



Photo by visuals on Unsplash

Online Voting for a New President?

The trouble with OmniBallot and other voting platforms


In this post, we show you the exposed vulnerabilities of one of the many online voting options...



Photo by Gary Bendig on Unsplash

A New Red Team Expert

A short interview with Daniel Yepes


We talked to Daniel Yepes, a colleague who recently achieved his certificate as a Red Team...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Photo by Michael Fenton on Unsplash

Breaking Down DevOps

The central components of DevOps definition


Here we introduce DevOps, a working methodology whose principles are communication,...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.