Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...



Robot playing the piano

Crash Course in Machine Learning

A survey of machine learning algorithms


In this article, we give a high-level view of each of the most important ML algorithms that have...



Cup with message in front of screen with code

Functional Fashion in JavaScript

Functional programming in JavaScript


Here we talk about some first steps in functional JavaScript and recommendations for migration....



Snake checking a code

Are You Checking Types?

Static type checking with mypy


What are the potential problems of untyped objects in Python? Here we work on the importance of...



Swiss army knive

Road to Functional Python

Functional coding in Python


Here is an intro to the essential aspects of functional programming in Python, its benefits, how...



Piece of code with a function

Why We Go Functional?

Functional vs Imperative


In this blog post, we show an analysis of why it is necessary to go functional even with...



Code on a screen

The Oracle of Code

About code as data


This blog post is a description of the code-as-data approach to source code analysis.



Data has a better idea sign

Will Machines Replace Us?

Automatic detection vs. manual detection


Vulnerability detection by an automated tool is not enough to conclude that an app is secure....



Monkey staring

The Infinite Monkey Fuzzer

Fuzz testing using American Fuzzy Lop


In this blog post, we are focused on how to perform basic fuzz attacks on desktop Linux C...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy