Photo by Aaron Burden on Unsplash

Jason Chavarría


Among exposed were secrets, code and AI training data

We describe the leak and mention its causes and threats, talk about the possible security risks when using Azure SAS tokens and give advice to prevent leaks.

Photo by Snowscat on Unsplash

Jason Chavarría


Toyota's ancient and recently disclosed data leaks

We describe the data leaks recently disclosed by Toyota Motor Corporation lasting five, eight and ten years.

Photo by James Beheshti on Unsplash

Jason Chavarría


The basics of cloud security posture management

Cloud security posture management involves vulnerability assessment, prioritization and remediation to secure cloud-based systems and infrastructures.

Photo by Kostiantyn Li on Unsplash

Jason Chavarría


Our CLI is an approved AST tool to secure cloud apps

Fluid Attacks' automated tool is recommended by the App Defense Alliance for static scanning under the Cloud Application Security Assessment (CASA) framework.

Foto por Kostiantyn Li en Unsplash

Jason Chavarría


Nuestro CLI fue aprobado para asegurar apps en la nube

Nuestra herramienta automatizada es recomendada por App Defense Alliance para el escaneo estático bajo el marco Cloud Application Security Assessment (CASA).

Photo by Alvan Nee on Unsplash

Jason Chavarría


Continuous manual security tests for going beyond MCSB

The Microsoft cloud security benchmark recommends regular red teaming and pentesting. We talk about how we help you go beyond that and achieve Azure DevSecOps.

Photo by jean wimmerlin on Unsplash

Jason Chavarría


Trends in cyberattacks and prevention this year

In this post, Fluid Attacks shares a digest of trends in cyberattacks and prevention in 2022.

Photo by Pejvak Samadani on Unsplash

Jason Chavarría


Continuous manual security tests for AWS CAF compliance

AWS has sketched the way to achieve DevSecOps and provided its Cloud Adoption Framework. In it, it advises pen testing and red teaming, two things we excel at.

Photo by Aleksandar Cvetanovic on Unsplash

Jason Chavarría


Benefits of shifting cloud security left

This post defines cloud DevSecOps, presents the key issues it helps tackle and gives you a condensed list of its benefits.

Inicia tu prueba gratuita de 21 días

Descubre las ventajas de nuestra solución Hacking Continuo, de la cual ya disfrutan cientos de organizaciones.

Inicia tu prueba gratuita de 21 días
Fluid Logo Footer

Hackeando software durante más de 20 años

Fluid Attacks analiza aplicaciones y otros sistemas, abarcando todas las fases de desarrollo de software. Nuestro equipo ayuda a los clientes a identificar y gestionar rápidamente las vulnerabilidades para reducir el riesgo de ciberincidentes y desplegar tecnología segura.

Copyright © 0 Fluid Attacks. We hack your software. Todos los derechos reservados.