Fluid Attacks logo
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Multicolored hallway. Photo by Efe Kurnaz on Unsplash: https://unsplash.com/photos/RnCPiXixooY

Do we need a Purple team?

How can we understand purple teams?

We can interpret the Purple teams as a mixture of Red or sword and Blue or shield teams in pentesting processes. They are professional hackers that simulate attacks and protect an organization....



Photo by NESA by Makers on Unsplash

Sastisfying App Security

An introduction to SAST

SAST is a kind of white box test in which a set of technologies is used to analyze the source code, byte code or the application binaries in search of known security vulnerabilities that can be...



Foosball red vs blue. Photo by Stefan Steinbauer on Unsplash: https://unsplash.com/photos/va-B5dBbpr4

Red Team exercise

What is a Red Team exercise?

Red Team refers to a team of professional hackers that attempts to access a system through simulating a cyberattack. During a Red Team exercise each team member plays a specific role while the...



Yellow police line tape on Unsplash: https://unsplash.com/photos/jM6Y2nhsAtk

Preventing Hacks at CERN

A chat with Andrés Gómez.

Have you heard about God’s particle? In 2012, the Large Hadron Collider (LHC) found the Higgs Boson; a particle predicted to exist in the 1960s thanks to the work of Peter Higgs and other...



Pythia and supplicant in the Oracle of Delphi

The Oracle of Code

About code as data

“Most programs are too large to understand in complete detail”. This was written in the 80’s.[1] Imagine the situation today. Hence the need for automated tools to aid in the process of analyzing...



Orion carrying Cedalion

Stand on the shoulders of giants

About software composition analysis

In our last post, we reproduced the discovery of a vulnerability in libpng. But that is only a small library, you might say, with a very limited scope and only 556 KiB installed. However, many,...



Service status - Terms of Use