Fluid Attacks Blog

Read our blog posts to learn about cybersecurity concepts, approaches, trends, news, techniques and more.

Filter by author:

Filter by tag:

Release date:

Filter by title:

Photo by Pierre Bamin on Unsplash

Felipe Ruiz


Watch out for keylogging/keyloggers

Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Photo by Denis Tuksar on Unsplash

Jason Chavarría


There's not an only way but here's a good one

We offer a guide to become an ethical hacker based off some information on common non-technical and technical skills hackers find useful for their role.

Photo by Jelleke Vanooteghem on Unsplash

Felipe Ruiz


Benefits and risks of these increasingly used programs

We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Photo by Sven Mieke on Unsplash

Andres Roldan


A hacker's view of the performance of Researcher CNAs

We've been a CNA for a while, and this is an analysis of our performance.

Photo by Phil Hearing on Unsplash

Jason Chavarría


Why so many are switching to Rust

Memory-related security issues are common and often critical. To reduce their presence, ongoing projects are writing in memory-safe languages like Rust.

Photo by Rohit Tandon on Unsplash

Felipe Ruiz


Description and critique of CEH certifications

Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Photo by Pramod Tiwari on Unsplash

Andres Roldan


An OffSec Experienced Pentester review

In this post, we review the PEN-300 course and OSEP certification offered by OffSec.

Photo by David Ramírez on Unsplash

Jason Chavarría


Or what makes the ethical hacker

If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.

Photo by charlesdeluvio on Unsplash

Felipe Ruiz


Recognize the value of this security assessment method

We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.