Photo by Sharon McCutcheon on Unsplash

Your Files Have Been Encrypted!

Some pieces of information about ransomware attacks


Everyone could be a target for ransomware attacks. Here we give an introduction to this topic...



Book in two languages

Can Code Be translated?

From code to words


Here we talk about Code2seq, which differs in adapting neural machine translation techniques to...



Photo by Andre Benz on Unsplash

Evolution of Cybercrime Costs (I)

Impact of cybercrime today portrays a new landscape


In 2012, the study ‘Measuring the cost of cybercrime’ was presented at the WEIS. Here we...



Target and darts

Further Down Code2vec

Vector representations of code


Here is a tutorial on the usage of code2vec to predict method names, determine the accuracy of...



Photo by Arteum.ro on Unsplash

Caution! Your Password Can Be Mine

A very short introduction to password cracking


After I wrote this post, I decided to change some of my most important passwords, and after you...



Photo by NeONBRAND on unplash: https://unsplash.com/photos/dDvrIJbSCkg

Bankrupt by Wrong Cybersecurity!

How some firms (especially SMBs) can go broke


Do companies go bankrupt by a cybersecurity breach? Some people assure there is no evidence...



Arrows vector field

Embedding Code Into Vectors

Vector representations of code


Here we discuss code2vec relation with word2vec and autoencoders to grasp better how feasible it...



Photo by Franck V. on Unsplash: https://unsplash.com/photos/_E1PQXKUkMw

The Vectors of Language

Distributed representations of natural language


This post is an overview of word2vec, a method for obtaining vectors that represent natural...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...



Broken blue ceramic plate on Unsplash: https://unsplash.com/photos/WdJkXFQ4VHY

Debug Like a Boss

Should CEOs discuss software defects?


Software quality management, including security weaknesses, has become of strategic relevance....



Mobile showing statistics. Photo by Austin Distel on Unsplash: https://unsplash.com/photos/EMPZ7yRZoGw

Battle Tendency

Most relevant IT investments in 2019


In this article, we discuss our research into the most relevant investments and budgets related...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy