Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Photo by Matthew Henry on Unsplash

Happening Now: Trends 2020

More realistic cybersecurity predictions


Earlier, we criticized some 'trends' in cybersecurity. Now, we discuss why some cybersecurity...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing


This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...



Red wooden mailbox near green leaf plan. Photo by Bundo Kim on Unsplash.

Respond the Name

Attacking a network using Responder


Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do...



Photo by Liam Tucker on Unsplash

A Perspective in Cybersecurity

A chat with Daniel Correa


We had the pleasure of chatting with Daniel Correa, a Security Expert who shared his views on...



Photo by Oleg Laptev on Unsplash

Cybersecurity Trends 2020? F*ck...

Fear will drive cybersecurity spending. Dear lord...


In this post, we review some cybersecurity trends published online. We discuss why it is a good...



Photo by Glen Hooper on Unsplash

Trust Nothing, Verify Everything

Sharing at least a modicum about phishing attacks


In this post, we give some general ideas about phishing, hoping to contribute to its prevention.



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment


This post is based on the information given on February 7th by Sylvester, from Lumu, in his...



Photo by Erda Estremera on Unsplash

Opening the Program's Box

General ideas about Software Reverse Engineering


Here we review some basic concepts of reverse engineering within information technology and...



Photo by Terry Vlisidis on Unsplash

Penetration Testing as a Service

NetSPI's 'advice': better platforms for PTaaS


This blog post is based on the webinar 'Scaling Your Security Program with Penetration Testing...



Photo by Jp Valery on Unsplash

Evolution of Cybercrime Costs (II)

Uber cuts $120 million after discovering ad fraud...


Here we conclude our review of 'Measuring the cost of cybercrime' by focusing, among other...



Rubber duckies

Understanding Program Semantics

With symbolic execution


Here's a reflection on the need to represent code before actually feeding it into neural network...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy