Risky poker move. Credits: https://unsplash.com/photos/vBpd607jLXs

Quantifying Risk

From color scales to probabilities and ranges


Here we discuss a survey of probabilistic methods that can be applied to quantify cybersecurity...



Binary machine learning. Credits: https://unsplash.com/photos/h3sAF1cVURw

Binary Learning

Learning to exploit binaries


In this article, we describe a system named VDiscover, created from the ground up to learn...



Depiction of a deep neural network. Credits: https://unsplash.com/photos/R84Oy89aNKs

Deep Hacking

Deep learning for vulnerability discovery


Here we describe the first systematic framework for using deep learning to detect...



Executive leaking business information

Attacking Without Announce

Nobody knows, but everything is allowed


We want to guide you about some management policies we suggest that you could take to answer...



Cats in a forest

Don't Let the Cat Out!

Trapdoor functions and their importance in security


This blog post is an overview of the mathematical concept 'Trapdoor,' the basis of information security.



Fluid Attacks, Among the Top Global Leaders 2018

Among the Top Global Leaders 2018

Fluid Attacks, a top cybersecurity company


Fluid Attacks was recognized as a global leader in the Cybersecurity category by Clutch, as one...



The actual serial killer doll

The Anomaly Serial Killer Doll

Hunting missing checks with anomaly detection


Here we describe the system Chucky, which applies machine learning and natural language...



Screen showing source code

Exploiting Code Graphs

Mining graph representations for vulnerabilities


In this post, we introduce Yamaguchi's concept of code property graphs, how to traverse them,...



Robot playing the piano

Crash Course in Machine Learning

A survey of machine learning algorithms


In this article, we give a high-level view of each of the most important ML algorithms that have...



greek statue with small angels.

Asymmetric DoS, Slow HTTP Attack

The story of David and Goliath


Here you'll learn how a slow HTTP attack works, how to inspect HTTP requests and responses, and...



Can machines learn to hack?

Machine-Learning to Hack

Machine learning for vulnerability discovery


This post is a bird's eye view of machine learning techniques applied to vulnerability discovery...



Hand holding a pirate toy

Bounty Writeup

How to resolve HTB Bounty


In this article, we present how to exploit a Bounty machine's vulnerabilities and how to gain...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy