Trend

Posts with this tag talk about tendencies or widely publicized situations related to cybersecurity around the world.

Photo by Sean Pollock on Unsplash

Wendy Rodriguez


Data breaches that left their mark on time

A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.

Photo by Florian Schmetz on Unsplash

Wendy Rodriguez


The best offense is a good defense

Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act.

Photo by Sebastian Pociecha on Unsplash

Wendy Rodriguez


Historic events that will inspire you to act

In this post, we talk about the biggest and most impactful ransomware attacks in history that emphasize the need to take cybersecurity measures.

Photo by Kenrick Mills on Unsplash

Felipe Ruiz


On-premises or in the cloud, security is your concern

We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.

Photo by Pawel Czerwinski on Unsplash

Felipe Ruiz


Attackers can indirectly instruct AI for malicious aims

We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.

Photo by Ray Hennessy on Unsplash

Felipe Ruiz


Let's rather say a bunch of breaches in a single box

They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Photo by Fervent Jant on Unsplash

Felipe Ruiz


NIST sheds light on the classification of attacks on AI

Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.

Photo by Wynand Uys on Unsplash

Jason Chavarría


Six main items in an AI policy for software development

Your company should have a policy about generative AI usage for software development. Read our suggestions on the most important items to include.

Photo by Takahiro Sakamoto on Unsplash

Jason Chavarría


Five best practices for coding with the help of gen AI

Generative AI tools are an ally for developers to write code efficiently. We share five best practices for developing software securely while using those tools.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.