Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
Photo by Oleg Laptev on Unsplash

Cybersecurity Trends 2020? F*ck Off


Figure 1. The billionaire John McAfee made a bold prediction in 2017. The website dickening.com keeps track of it. Spoiler alert: of course, the guy won’t do that. How many times the end of the...



Photo by Glen Hooper on Unsplash

Trust Nothing, Verify Everything

Sharing at least a modicum about phishing attacks

The current global situation with the coronavirus or COVID-19 has led many of us to respond with our work from home. Amidst so much uncertainty, there are many of us who could be looking for...



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment

The activity of cybersecurity testing at present, according to the information given to us by Sylvester and Cuervo, can prompt us to remember its beginnings. Among them, for example, what was...



Photo by Erda Estremera on Unsplash

Opening the Program's Box

General ideas about Software Reverse Engineering

Just by curiosity, a child today may take a device and disassemble it. Possibly wondering what elements are inside and how they come together to work. Something similar can be done by an adult in...



Photo by Terry Vlisidis on Unsplash

Penetration Testing as a Service

NetSPI's 'advice': better platforms for PTaaS

Today, cybersecurity risks are becoming prominent, growing year by year, affecting large numbers of organizations. Many of them have not maintained basic security principles in favor of their...



Photo by Jp Valery on Unsplash

Evolution of Cybercrime Costs (II)

Uber cuts $120 million after discovering ad fraud...

In a previous blog post, we discussed some of the findings of Anderson et al. (2019) regarding the changes in cybercrime costs, more prominently in the United States and the United Kingdom. We...



Rubber duckies

Understanding Program Semantics

With symbolic execution

Thus far, we have established the need to represent code as vectors before feeding it into a machine learning classifier that will help us sort through a messy project. We have also discussed at...



Photo by Sharon McCutcheon on Unsplash

Your Files Have Been Encrypted!

Some pieces of information about ransomware attacks

When we talk about ransomware we refer to a very popular kind of malware. A malicious software that being on your computer (also on your mobile device) is capable to encrypt some of your important...



Book in two languages

Can code be translated?

From code to words

Now that we have a better undestanding of how natural language and code embeddings work, let us take a look at a work by the same authors of code2vec, entitled code2seq: generating sequences from...



Photo by Andre Benz on Unsplash

Evolution of Cybercrime Costs (I)

Impact of cybercrime today portrays a new landscape

Every year, the Workshop on the Economics of Information Security (WEIS) gathers renowned social and computer scientists (both from and outside academia). In WEIS, the economic implications of...



Target and darts

Further down code2vec

Vector representations of code

Let us continue with our series on representing objects as vectors: natural language, code, let us take a deeper look at how code2vec works. Even personality profiles can be represented as vectors...



Photo by Arteum.ro on Unsplash

Caution! Your Password Can Be Mine

A very short introduction to password cracking

Passwords are currently the most popular authentication method in computer systems and IT, and can serve as protection of our private information in email and bank accounts, social networks, and...




Service status - Terms of Use