Fluid Attacks Blog » Social Engineering
156 FOLLOWERS
Read Fluid Attacks' blog posts about IT, pen-testing, hacking challenges writeups, information security, and ethical hacking recent trends. Fluid Attacks performs comprehensive continuous hacking at the speed of your business, combining automation, AI and the expertise of ethical hackers.
Fluid Attacks Blog » Social Engineering
1y ago
In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures ..read more
Fluid Attacks Blog » Social Engineering
2y ago
Researchers found vulnerabilities in some versions of eight popular package managers. We review how an attacker could exploit them and urge everyone to upgrade ..read more
Fluid Attacks Blog » Social Engineering
2y ago
This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point ..read more
Fluid Attacks Blog » Social Engineering
2y ago
Here we'll explain the different types of cryptojacking and give an example. We'll also discuss its legal use and the advantages of implementing it in an app ..read more
Fluid Attacks Blog » Social Engineering
2y ago
This post gives you an overview of the FBI's 2020 Internet Crime Report, based on the activity of the Internet Crime Complaint Center (IC3 ..read more
Fluid Attacks Blog » Social Engineering
2y ago
In this post, we give some general ideas about phishing, hoping to contribute to its prevention ..read more
Fluid Attacks Blog » Social Engineering
2y ago
Last April, if you googled for "spoofing," you could find the word Pokémon in the top trends. Here's what that has to do with your company's vulnerabilities ..read more
Fluid Attacks Blog » Social Engineering
2y ago
In this blog, you will learn how and why is smishing growing as one of the most popular forms of cyber-scam ..read more
Fluid Attacks Blog » Social Engineering
2y ago
America is talking about the DarkSide ransomware attack against Colonial Pipeline, one of the largest USA pipeline companies. Here is what we know about it ..read more
Fluid Attacks Blog » Social Engineering
2y ago
Read this post to learn the psychological tactics used in cyberattacks and what personality traits make targets more (or less) susceptible to fall for them ..read more