
Andres Roldan
A Certified Red Team Lead (CRTL) Review
In this post we review the RTO-2 course and CRTL certification offered by Zero-Point Security.

Felipe Ruiz
Top 10 international capture the flag competitions
Do you know what capture the flag is in the cybersecurity field? Are you aware of some of the most recent and prominent CTF competitions worldwide? Learn here.

Jason Chavarría
Top 10 offensive security international conferences
Want to know which are the best conferences for hackers? We share our selection of the top 10 international hacking events focusing on offensive security.

Jason Chavarría
Enhancing cybersecurity across government entities
Learn about the Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021, which were signed into law.

Jason Chavarría
Learn with Fluid Attacks about this professional path
Ever wondered what a DevSecOps engineer does in the cybersecurity industry? Find out their job functions and the required skills and experience to become one.

Jason Chavarría
Do you have an incident response plan already?
Organizations need to realize that they are always at risk of suffering cyberattacks and it is of utmost importance that they have a plan for when that happens.

Jason Chavarría
Clues in the investigation of cyberattacks
We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.

Jason Chavarría
Employees as the strongest link in the security chain
The human-as-a-security-sensor paradigm asserts that catastrophe can be prevented if employees are trained to report threat events promptly. Learn more here.

Jason Chavarría
Discover social engineers' weapons of influence
Read this post to learn the psychological tactics used in cyberattacks and what personality traits make targets more (or less) susceptible to fall for them.