Photo by visuals on Unsplash

Online Voting for a New President?

The trouble with OmniBallot and other voting platforms


In this post, we show you the exposed vulnerabilities of one of the many online voting options...



Photo by Gary Bendig on Unsplash

A New Red Team Expert

A short interview with Daniel Yepes


We talked to Daniel Yepes, a colleague who recently achieved his certificate as a Red Team...



Photo by Vinayak Varma on Unsplash

Anyone Can Look Inside!

Working with OSS today can be a great advantage


Security can be significantly enhanced when codes are presented publicly. In this post, we talk...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Bradley Feller on Unsplash

We've Reached a New Standard

More requirements in Rules are firmly supported


Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Photo by Matthew Henry on Unsplash

Happening Now: Trends 2020

More realistic cybersecurity predictions


Earlier, we criticized some 'trends' in cybersecurity. Now, we discuss why some cybersecurity...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing


This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...



Photo by Liam Tucker on Unsplash

A Perspective in Cybersecurity

A chat with Daniel Correa


We had the pleasure of chatting with Daniel Correa, a Security Expert who shared his views on...



Photo by Oleg Laptev on Unsplash

Cybersecurity Trends 2020? F*ck...

Fear will drive cybersecurity spending. Dear lord...


In this post, we review some cybersecurity trends published online. We discuss why it is a good...



Photo by Glen Hooper on Unsplash

Trust Nothing, Verify Everything

Sharing at least a modicum about phishing attacks


In this post, we give some general ideas about phishing, hoping to contribute to its prevention.




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy