Mobile showing statistics. Photo by Austin Distel on Unsplash:

Battle Tendency

Most relevant IT investments in 2019

In this article, we discuss our research into the most relevant investments and budgets related...

Photo by NESA by Makers on Unsplash

Sastisfying App Security

An introduction to SAST

This blog is an introduction to the static application security test (SAST). It will provide the...

Foosball red vs blue. Photo by Stefan Steinbauer on Unsplash:

Red Team exercise

What is a Red Team exercise?

This blog will provide information on a Red Team exercise. It will give the reader a general...

CPU Usage. Photo by Alberto Duo on Unsplash:

Cryptojacking, a Real Malware?

Understanding cryptojacking "malware"

Here we'll explain the different types of cryptojacking and give an example. We'll also discuss...

Computer with do what is great sign.

Git on steroids

From messy logs to Data Analytics

Learn why it is important and how to define a Git commit message syntax and use real-time commit...

Cucumber lot

Gherkin on steroids

How to document detailed attack vectors

How to use Gherkin to document attack vectors in vulnerable applications using more advanced...

Cucumber slices

Is Your App in a Pickle?

Documenting vulnerabilities with gherkin

Gherkin can be used for documentation and automated testing. Here we focus on its basics and how...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy