Multicolored hallway. Photo by Efe Kurnaz on Unsplash:

Do We Need a Purple Team?

Understanding Purple Teams

In this blog, we discuss the fundamentals of Purple Teams and possible ways to implement them in...

Photo by NESA by Makers on Unsplash

Sastisfying App Security

An introduction to SAST

This blog post is an introduction to SAST. We share the concept, how SAST works, its types,...

Foosball red vs blue. Photo by Stefan Steinbauer on Unsplash:

Red Team Exercise

What is a Red Team exercise?

Here we give the reader a general context about what a Red Team does and the main strategy used...

Photo by Aurélien Clément Ducret on Unsplash

Preventing Hacks at CERN

A chat with Andrés Gómez

For this post, we spoke with Andrés Gómez, a former Fluid Attacks' member, who is researching to...

Code on a screen

The Oracle of Code

About code as data

This blog post is a description of the code-as-data approach to source code analysis.

Man standing in mountain

Stand on the Shoulders of Giants

About software composition analysis

Here we mainly develop a discussion on 'A9' of the OWASP Top 10: Using components with known...

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.