Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk

I want to start with this sentence that Khare gave us days before the webinar (which you can access here) in a blog post (link here): “Mobile app owners and developers are receiving a failing...



Photo by Matthew Henry on Unsplash

Happening Now: Trends 2020

More realistic cybersecurity predictions

In a previous post, we downplayed some cybersecurity predictions for 2020. We found some of them as imprecise, not plausible, or not even being a trend (instead, prevalent decades ago). In this...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing

First of all, we give you the links where you can find the webinar video and the copy of the document —both from ForAllSecure. Almost everything expressed below is based on both sources. In the...



Photo by Liam Tucker on Unsplash

A Perspective in Cybersecurity

A chat with Daniel Correa

Daniel is a highly skilled security professional. His insights about the current cybersecurity landscape complements previous perspectives on our blog. Daniel has a bachelor’s degree in Computer...



Photo by Oleg Laptev on Unsplash

Cybersecurity Trends 2020? F*ck...

Fear will drive cybersecurity spending. Dear lord...

Figure 1. The billionaire John McAfee made a bold prediction in 2017. The website dickening.com keeps track of it. Spoiler alert: of course, the guy won’t do that. How many times the end of the...



Photo by Glen Hooper on Unsplash

Trust Nothing, Verify Everything

Sharing at least a modicum about phishing attacks

The current global situation with the coronavirus or COVID-19 has led many of us to respond with our work from home. Amidst so much uncertainty, there are many of us who could be looking for...



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment

The activity of cybersecurity testing at present, according to the information given to us by Sylvester and Cuervo, can prompt us to remember its beginnings. Among them, for example, what was...



Screen showing performance stats. Photo by Stephen Dawson on Unsplash: https://unsplash.com/photos/qwtCeJ5cLYs

Security in trends

Cybersecurity risks in technology trends

In today’s world technology evolves rapidly. New tools, approaches, and trends seem to come out on almost a daily basis. It’s our duty to keep pace with these changes, adapt to new technologies...



Service status - Terms of Use