Fluid Attacks logo
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
Mobile showing statistics. Photo by Austin Distel on Unsplash: https://unsplash.com/photos/EMPZ7yRZoGw

Battle Tendency

Most relevant IT investments in 2019

In our last article, we talked about cybersecurity risks that may be present in the most popular IT technology currently in use. Although we mentioned some of these in the second part of our...



Photo by NESA by Makers on Unsplash

Sastisfying App Security

An introduction to SAST

SAST is a type of white box test in which a set of technologies is used to analyze the source code, byte code or the application binaries in order to reveal known security vulnerabilities that can...



Foosball red vs blue. Photo by Stefan Steinbauer on Unsplash: https://unsplash.com/photos/va-B5dBbpr4

Red Team exercise

What is a Red Team exercise?

Red Team refers to a team of professional hackers that attempts to access a system through simulating a cyberattack. During a Red Team exercise each team member plays a specific role while the...



CPU Usage. Photo by Alberto Duo on Unsplash: https://unsplash.com/photos/e4rcg33x4fA

Cryptojacking, a real malware?

Understanding cryptojacking "malware".

Before discussing the concept, we need a brief definition of blockchain. It is simply a unique, consensual, and distributed registry on the network that allows storage of information that cannot...



Git On Steroids

Git on steroids

From messy logs to Data Analytics

There is a universal law that anyone in the tech world should know: If you ask a programmer to do something, he/she will do it their way. Even though creativity, abstract thinking, and putting...



Pickled cucumbers

Gherkin on steroids

How to document detailed attack vectors

In the field of information security, finding all vulnerabilities is as important as reporting them as soon as possible. For that, we need an effective means to communicate with all stakeholders....



Cucumber slices

Is your app in a pickle?

Documenting vulnerabilities with gherkin

Gherkin is a simple language that can be used for software documentation and testing. It can be thought of as a tool for communication between stakeholders and developers which helps minimize...



Service status - Terms of Use