Trend

Posts with this tag talk about tendencies or widely publicized situations related to cybersecurity around the world.

Photo by Jasmin Egger on Unsplash

Jason Chavarría


If the essential security layer is flawed, you're toast

You must not stop remediating vulnerabilities in your mobile apps just because you fully trust technologies such as RASP or anti-reverse engineering solutions.

Photo by Christian Wiediger on Unsplash

Wendy Rodriguez


The need to enhance security within the fintech sector

Fintechs are disrupting the financial services sector, creating cybersecurity challenges. Here is its current landscape and best practices for the sector.

Photo by mitchell kavan on Unsplash

Wendy Rodriguez


Bringing the zero trust model to life

ZTNA, an element of the zero trust model, makes access management simple and secure for everyone involved.

Photo by Sean Pollock on Unsplash

Wendy Rodriguez


Data breaches that left their mark on time

A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.

Photo by Florian Schmetz on Unsplash

Wendy Rodriguez


The best offense is a good defense

Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act.

Photo by Sebastian Pociecha on Unsplash

Wendy Rodriguez


Historic events that will inspire you to act

In this post, we talk about the biggest and most impactful ransomware attacks in history that emphasize the need to take cybersecurity measures.

Photo by Kenrick Mills on Unsplash

Felipe Ruiz


On-premises or in the cloud, security is your concern

We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.

Photo by Pawel Czerwinski on Unsplash

Felipe Ruiz


Attackers can indirectly instruct AI for malicious aims

We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.

Photo by Ray Hennessy on Unsplash

Felipe Ruiz


Let's rather say a bunch of breaches in a single box

They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.