Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment


This post is based on the information given on February 7th by Sylvester, from Lumu, in his...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...



handshake

A Conflict of Interest?

You probably don’t see it.


In cybersecurity, there's plenty of opportunities for Conflicts of Interest to emerge. Here we...



Vulnerability disclosure

Vulnerability Disclosure Ecosystem

Responsible vulnerability disclosure


In this blog post, we will explain some good practices of vulnerability disclosure by...



Painting a red and blue wall

LibSSH New Vulnerability

New vulnerability on libssh CVE-2018-10933


Here, we will explain a vulnerability that allows a remote attacker to bypass authentication by...



Person working on the computer while looking at cellphone

Delimiting an Ethical Hacking

How to define the scope of your objectives


When security flaws are found through ethical hacking, it is important to delimit the...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy