Photo by visuals on Unsplash

Online Voting for a New President?

The trouble with OmniBallot and other voting platforms


In this post, we show you the exposed vulnerabilities of one of the many online voting options...



Photo by Gary Bendig on Unsplash

A New Red Team Expert

A short interview with Daniel Yepes


We talked to Daniel Yepes, a colleague who recently achieved his certificate as a Red Team...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Photo by Michael Fenton on Unsplash

Breaking Down DevOps

The central components of DevOps definition


Here we introduce DevOps, a working methodology whose principles are communication,...



Photo by Vinayak Varma on Unsplash

Anyone Can Look Inside!

Working with OSS today can be a great advantage


Security can be significantly enhanced when codes are presented publicly. In this post, we talk...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Photo by Liam Tucker on Unsplash

A Perspective in Cybersecurity

A chat with Daniel Correa


We had the pleasure of chatting with Daniel Correa, a Security Expert who shared his views on...



Photo by Glen Hooper on Unsplash

Trust Nothing, Verify Everything

Sharing at least a modicum about phishing attacks


In this post, we give some general ideas about phishing, hoping to contribute to its prevention.



Photo by Erda Estremera on Unsplash

Opening the Program's Box

General ideas about Software Reverse Engineering


Here we review some basic concepts of reverse engineering within information technology and...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy