Software

Posts with this tag mention programs useful for or related to security, as well as applications with vulnerabilities or attacked by threat actors.

Photo by Kenrick Mills on Unsplash

Felipe Ruiz


On-premises or in the cloud, security is your concern

We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.

Photo by Mike Lewinski on Unsplash

Felipe Ruiz


It's about time you relied on code-assisted pentesting

Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.

Photo by Pawel Czerwinski on Unsplash

Felipe Ruiz


Attackers can indirectly instruct AI for malicious aims

We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.

Photo by Fervent Jant on Unsplash

Felipe Ruiz


NIST sheds light on the classification of attacks on AI

Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.

Photo by Peter Neumann on Unsplash

Jason Chavarría


Importance, types, steps, tools of pentesting, and more

Explore the world of penetration testing and gain understanding of how it bolsters your cybersecurity safeguards against emerging threats.

Photo by ANIRUDH on Unsplash

Jason Chavarría


Boeing, 60 credit unions, and more, have been impacted

The U.S. has been a major focus of ransomware attacks leveraging the Citrix Bleed vulnerability. We tell you about recent exploits involving this security flaw.

Photo by Fotis Fotopoulos on Unsplash

Carlos Bello


Beware of insecure-by-default libraries!

Here we present in detail a vulnerability we discovered in BookStack v23.10.2, along with the steps to follow to replicate the exploit.

Photo by Erzsébet Vehofsics on Unsplash

Jason Chavarría


Learn the types, tools, techniques, principles and more

We define security testing and tell you all the basics. These include how to perform it to find vulnerabilities in software applications and other systems.

Photo by Jean-Daniel Calame on Unsplash

Jason Chavarría


Now we follow all best practices required by OpenSSF

After evidencing statement and branch coverages above 90% and other high-level best practices, our open-source project Universe got the rare OpenSSF gold badge.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.