Vulnerability

Entries with this tag address the finding, existence or (sometimes controlled) exploitation of specific security flaws or misconfigurations in systems.

Photo by Claudio Schwarz on Unsplash

Wendy Rodriguez


Is your financial service as secure as you think?

Organizations providing financial services are prime targets for cybercrime. Learn why, which threats lurk, and how we can help.

Photo by Brian Kelly on Unsplash

Felipe Ruiz


We need you, but we can't give you any money

We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.

Photo by Valery Fedotov on Unsplash

Felipe Ruiz


A digital infrastructure issue that many still ignore

The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.

Photo by Ray Hennessy on Unsplash

Felipe Ruiz


Let's rather say a bunch of breaches in a single box

They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Photo by ANIRUDH on Unsplash

Jason Chavarría


Boeing, 60 credit unions, and more, have been impacted

The U.S. has been a major focus of ransomware attacks leveraging the Citrix Bleed vulnerability. We tell you about recent exploits involving this security flaw.

Photo by Fotis Fotopoulos on Unsplash

Carlos Bello


Beware of insecure-by-default libraries!

Here we present in detail a vulnerability we discovered in BookStack v23.10.2, along with the steps to follow to replicate the exploit.

Photo by Yeshi Kangrang on Unsplash

Carlos Bello


What is invisible to some hackers is visible to others

Here we present in detail a vulnerability we discovered in PaperCut MF/NG v22.0.10, along with the steps to follow to replicate the exploit.

Photo by Jelleke Vanooteghem on Unsplash

Felipe Ruiz


Benefits and risks of these increasingly used programs

We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Photo by Rohit Tandon on Unsplash

Felipe Ruiz


Description and critique of CEH certifications

Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.