Web

Posts with this tag mention the security of web applications or their use to practice attacks.

Photo by Alexander Aguero on Unsplash

Felipe Ruiz


Conti gang relentlessly lashes their vulnerable systems

It's been almost two weeks since the beginning of the Conti gang's new wave of cyberattacks against Costa Rican organizations. Find out here what has happened.

Photo by Umberto on Unsplash

Jason Chavarría


Google is forced to give EU users a 'Reject all' option

Users in France can now reject all cookies in Google Search and YouTube more easily after these services' banners were found to break EU data privacy laws.

Photo by Chris Briggs on Unsplash

Felipe Ruiz


Three strikes already for this web browser in 2022

In this blog post, you can learn about three zero-day vulnerabilities of at least high severity in Google Chrome that have been exploited this year.

Photo by Chris Karidis on Unsplash

Felipe Ruiz


The Blanc brothers and the Chappe telegraph network

Have you ever asked yourself that question? Discover in this blog post the old incident that is considered by many as the first cyberattack in history.

Photo by Rostislav Artov on Unsplash

Felipe Ruiz


The emergence of WhisperGate as the first worrying sign

Although Russia has not invaded Ukraine so far, cyberattacks attributed to that world power have again been reported and could escalate into a cyberwar.

Photo by Vincent van Zalinge on Unsplash

Jason Chavarría


What was Azure's four-year-old vulnerability?

A recently discovered four-year-old vulnerability in Microsoft's Azure App Service has been keeping the source codes of customer applications public.

Photo by Mathew Schwartz on Unsplash

Jason Chavarría


New OWASP Top 10 emphasizes secure design

The OWASP Top 10 ranks the most critical security risks to web applications. The 2021 installment comes with new categories, name changes and a new order.

Photo by National Cancer Institute on Unsplash

Felipe Ruiz


Don't leave the relentless SQL Injection in oblivion

Thanks to this post, you'll understand the injection attacks in general terms, especially the SQL Injection. You'll also have some prevention ideas at hand.

Photo by Jono Hirst on Unsplash

Felipe Ruiz


The Colombian Foreign Ministry faced a big trouble

Here I give you an overview of the recent Colombian Foreign Ministry's security problem and the inadequate disclosure of such vulnerability in the media.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.