Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
Photo by Andre Benz on Unsplash

Evolution of Cybercrime Costs (I)

Impact of cybercrime today portrays a new landscape

Every year, the Workshop on the Economics of Information Security (WEIS) gathers renowned social and computer scientists (both from and outside academia). In WEIS, the economic implications of...



Target and darts

Further down code2vec

Vector representations of code

Let us continue with our series on representing objects as vectors: natural language, code, let us take a deeper look at how code2vec works. Even personality profiles can be represented as vectors...



Photo by Arteum.ro on Unsplash

Caution! Your Password Can Be Mine

A very short introduction to password cracking

Passwords are currently the most popular authentication method in computer systems and IT, and can serve as protection of our private information in email and bank accounts, social networks, and...



Photo by NeONBRAND on unplash: https://unsplash.com/photos/dDvrIJbSCkg

Bankrupt by Wrong Cybersecurity!

How some firms (especially SMBs) can go broke

How often do we hear a company went bankrupt because of a hack? You’ve probably never heard about such a thing. What we usually see in newspapers is millions of dollars in losses, big corporations...



Arrows vector field

Embedding code into vectors

Vector representations of code

As we have stated over and over in the past, the most critical step in our ongoing project of building a machine learning (ML) based code classifier will be that of representing the code as...



Photo by Franck V. on Unsplash: https://unsplash.com/photos/_E1PQXKUkMw

The Vectors of Language

Distributed representations of natural language

Recall that in previous iterations we described the required steps for our code classifier to work, which can be roughly summarized as: Fetching data. Representing code as vectors. Training the...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder

Before taking the exam I already had years of work work experience as a penetration tester at Fluid Attacks. So, I already had the knew how to perform a penetration test and how to build a...



Broken blue ceramic plate on Unsplash: https://unsplash.com/photos/WdJkXFQ4VHY

Debug like a Boss

Should CEOs discuss software defects?

You wake up, and probably check your smartphone immediately. Chances are you already have smart devices at home; like light bulbs, you turn on and off from the same smartphone. You often check...



Mobile showing statistics. Photo by Austin Distel on Unsplash: https://unsplash.com/photos/EMPZ7yRZoGw

Battle Tendency

Most relevant IT investments in 2019

In our last article, we talked about cybersecurity risks that may be present in the most popular IT technology currently in use. Although we mentioned some of these in the second part of our...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones

Android is an operating system based on the Linux kernel and used by mobile devices such as smartphones and tablets. Due to its popularity, it is the major target for hackers. One of their common...



Photo by camilo jimenez on Unsplash: https://unsplash.com/photos/vGu08RYjO-s

Triage for Hackers

Prioritize code auditing via ML

Based upon our last experiment, in this article, I will provide a global vision of how our ML for vulnerability discovery approach should work. First, what problem would this solve? I am repeating...



Multicolored hallway. Photo by Efe Kurnaz on Unsplash: https://unsplash.com/photos/RnCPiXixooY

Do we need a Purple Team?

Understanding Purple Teams

A good way to think of Purple Teams is that they are a mixture of Red or sword, and Blue or shield teams in pentesting processes. They are professional hackers that simulate attacks and protect an...




Service status - Terms of Use