Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
Screen showing performance stats. Photo by Stephen Dawson on Unsplash: https://unsplash.com/photos/qwtCeJ5cLYs

Security in trends

Cybersecurity risks in technology trends

In today’s world technology evolves rapidly. New tools, approaches, and trends seem to come out on almost a daily basis. It’s our duty to keep pace with these changes, adapt to new technologies...



Photo by NESA by Makers on Unsplash

Sastisfying App Security

An introduction to SAST

SAST is a type of white box test in which a set of technologies is used to analyze the source code, byte code or the application binaries in order to reveal known security vulnerabilities that can...



Data Has A Better Idea. Photo by Stefan Steinbauer on Unsplash: https://unsplash.com/photos/1K6IQsQbizI

Vulnerabilities in Deep Learning

Deep Learning for vulnerability disclosure

Currently, data scientists have begun using AI (Artificial Intelligence) algorithms to solve problems from the data perspective. Data scientists have been working on problems related to areas like...



Foosball red vs blue. Photo by Stefan Steinbauer on Unsplash: https://unsplash.com/photos/va-B5dBbpr4

Red Team exercise

What is a Red Team exercise?

Red Team refers to a team of professional hackers that attempts to access a system through simulating a cyberattack. During a Red Team exercise each team member plays a specific role while the...



Digital heart beat monitor on Unsplash https://unsplash.com/photos/0lrJo37r6Nk

HealthTech Protection

How healthcare breakthroughs could help cybersecurity

Many startups are achieving success by redefining how the economy works. Xtechs (financial, health, insurance, among others) are reducing operational costs and delivering more value to customers,...



CPU Usage. Photo by Alberto Duo on Unsplash: https://unsplash.com/photos/e4rcg33x4fA

Cryptojacking, a real malware?

Understanding cryptojacking "malware"

Before we begin, we need a brief definition of blockchain. It is simply a unique, consensual, and distributed registry on the network that allows storage of information that cannot be modified,...



Bookshelf with some books

Learning how to code

A chat with Ricardo Yepes. Part 2.

We continue our conversation with Ricardo. We threw him a question that was the source of interesting debates at Fluid Attacks some time ago. Should a company invest in security awareness...



Bookshelf with some books

We need more training in basic stuff

A chat with Ricardo Yepes. Part 1.

Ricardo is a DevOps engineer in Australia. Previously, he worked for Fluid Attacks as a security analyst and instructor. He also spent a couple of years developing and maintaining an educational...




Service status - Terms of Use