Security

I Saw Your Data on the Dark Web

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] What is the Dark Web and what do we find there? In September, I wrote about credential stuffing, the kind of attack that depends on the collection of huge amounts of data (lists of user/password pairs), which usually are sold on the Dark Web. But, what is the …

I Saw Your Data on the Dark Web Read More »

Security Breaches Are Your Fault

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] Confusion with the cloud shared responsibility model In a previous post from late 2019, Oscar Prado, cybersecurity analyst at Fluid Attacks, touched on the matter of most companies migrating to the cloud. One year later, we indicated a substantial acceleration and growth in that phenomenon, primarily driven by the …

Security Breaches Are Your Fault Read More »

Choosing the Right Pentesting Team

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] Consider these key attributes to make a good decision Data breaches and multiple cyberattacks against companies of all types and sizes in the now predominant digital world continue to increase. (See information here on the previous year’s cybercriminal trends.) Many of these companies have realized the need to use …

Choosing the Right Pentesting Team Read More »

You Just Won a Car! Claim It Here!

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] But before doing it you must know what smishing is You just won a car! Claim it here! Probably it is not the first time you’ve received this type of SMS on your phone. We probably shouldn’t have to remind you that if you receive something like this, …

You Just Won a Car! Claim It Here! Read More »

Spoofing, Pokémon & Vulnerability

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] Why may the fun of some be the danger of others? Spoofing is not the name of any Pokémon (although it might be), but that of a type of scam. Over the past year, it accounted for more than $216M in losses in the United States (according to …

Spoofing, Pokémon & Vulnerability Read More »

Safer, Cheaper and Defter

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] Why must companies comply with GDPR policies? May of this year marked the third anniversary of one of the most important legislative implementations of the last decade: The General Data Protection Regulation (GDPR). In Fluid Attacks, we have talked a little about what GDPR is, but today we want to dedicate …

Safer, Cheaper and Defter Read More »

Ransomware and Cyber Insurance

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] Why is security always excessive until it’s not enough? On June 28, the Royal United Services Institute (RUSI) published a report explaining why cyber insurance spurs ransomware attacks. After its publication, several blogs emerged summarizing or detailing the problem (I recommend ZDNet , PCrisk, TechTimes and Security Intelligence articles). This blog post is not intended to …

Ransomware and Cyber Insurance Read More »

Such as Microbes Getting Into You?

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] Every person who frequently devotes their attention to the field of cybersecurity most certainly recognizes the OWASP Top 10 Project. However, without leaving aside any reader engaged here, we can say that what this standard “represents [is] a broad consensus about the most critical security risks to web applications.” This …

Such as Microbes Getting Into You? Read More »

Do Not Read This Post

Do Not Read This Post

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] What if this post were a malicious link? Why the f*ck did you click to this post? Seriously, why? Chances are, you were attracted to the title, paradoxically, suggesting not to do something. But, here you are. We are glad you did not follow that direction but …

Do Not Read This Post Read More »

The F*CK Strategy

[wl_row ][wl_column column=”12″][wl_text_html margin_notebook_deprecator=”1″ margin_tablet_landscape_deprecator=”1″ margin_tablet_deprecator=”1″ margin_mobile_deprecator=”1″ scroll_delay=”300″] Do you like fried chicken? A year ago or so, KFC -the chicken fast-food chain- was featured in almost every news outlet in the UK: they ran out of chicken for an entire weekend. A horror story for a food-chain with 900 restaurants in the country. People were mad at them, …

The F*CK Strategy Read More »