Trend

Posts with this tag talk about tendencies or widely publicized situations related to cybersecurity around the world.

Photo by Marek Szturc on Unsplash

Felipe Ruiz


A zero-day vulnerability in tj-actions/changed-files

GitHub Action breach! Learn how tj-actions/changed-files leaked secrets & how to protect your repos. Read our breakdown.

Photo by David Clode on Unsplash

Felipe Ruiz


For a better focus on vulnerabilities to be prioritized

At Fluid Attacks, we believe in the value of the EPSS metric, which is why we have implemented it in our solution, and in this post, we explain it extensively.

Photo by Steve Smith on Unsplash

Felipe Ruiz


F-scores and accuracy SLA at Fluid Attacks

Fluid Attacks in its ASPM solution offers its customers strict accuracy measures based on F-scores. Find out what it's all about.

Photo by Ümit Yıldırım on Unsplash

Felipe Ruiz


10 recent critical security breaches

The transportation and logistics sector is now among the most attacked worldwide. Discover some of the most significant recent cyber attacks.

Photo by Frankie Mish on Unsplash

Felipe Ruiz


Towards enhanced vulnerability prioritization

In this blog post, you will learn about reachability analysis, a software assessment technique that helps to prioritize vulnerabilities for their remediation.

Photo by Logan Weaver on Unsplash

Felipe Ruiz


Introduction to cybersecurity in the aviation sector

As part of the transportation industry, the aviation sector, in its massive digital transformation, has faced cybersecurity challenges worth highlighting.

Photo by Clay Banks on Unsplash

Felipe Ruiz


Protecting your PoS systems from cyber threats

PoS devices are now part and parcel of the retail industry. In this post, we explain the risks these systems face and the best practices for protecting them.

Photo by Charles Etoroma on Unsplash

Felipe Ruiz


Top seven successful cyberattacks against this industry

Cyberattacks that negatively impact some companies can serve as a warning and a lesson for others, at least for those still behind the curve in cybersecurity.

Photo by Anima Visual on Unsplash

Felipe Ruiz


Challenges, threats, and best practices for retailers

The retail sector is part of the global digital transformation, so it is constantly exposed to security threats, for which it should have a preventive posture.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Testing software security for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.