Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Photo by Charles Deluvio on Unsplash

Always 100% Ready for Remote Work

The product of a valuable effort over ten years ago


Here is an overview of what our technological architecture and our way of operation are, which...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing


This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment


This post is based on the information given on February 7th by Sylvester, from Lumu, in his...



Photo by Terry Vlisidis on Unsplash

Penetration Testing as a Service

NetSPI's 'advice': better platforms for PTaaS


This blog post is based on the webinar 'Scaling Your Security Program with Penetration Testing...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...



Executive leaking business information

Attacking Without Announce

Nobody knows, but everything is allowed


We want to guide you about some management policies we suggest that you could take to answer...



several balloons floating in the air

Healthcare in the Clouds

Cloud based systems in healthcare and their issues


Cloud-based systems can be of great benefit to healthcare institutions, but they can also lead...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy