Photo by Cristofer Jeschke on Unsplash

And Don't Forget ISO/IEC 30111

Guidelines for the vulnerability handling processes


This post is related to vulnerability handling processes (ISO/IEC 30111), complementing the...



Photo by Keagan Henman on Unsplash

Don't Be Ignorant of ISO/IEC 29147

Guidelines for the vulnerability disclosure processes


Would you like to get a clearer idea about vulnerability disclosure? Start with reading this...



Photo by Jono Hirst on Unsplash

Thoughtless Vulnerability Reporting

The Colombian Foreign Ministry faced a big trouble


Here I give you an overview of the recent Colombian Foreign Ministry's security problem and the...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Bradley Feller on Unsplash

We've Reached a New Standard

More requirements in Rules are firmly supported


Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...



Computer with do what is great sign.

Git on Steroids

From messy logs to Data Analytics


Learn here, among other things, how to define a Git commit message syntax and use real-time...



Multiple icon accounts

Multiple Credentials Begone!

Security issues and solutions of SSO services


Here we explain how to use SAML, a popular SSO implementation standard for logging users into...



Photo by Jono Hirst on Unsplash

Insensato reporte de vulnerabilidad

La Cancillería colombiana enfrentó un grave problema


Aquí les doy una visión general de la reciente vulnerabilidad de seguridad de la Cancillería...



Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.