See what's new at Fluid Attacks! 🎉
✨Make your voice heard in the AppSec world!✨
Share your thoughts on Fluid Attacks' solution on Gartner Peer Insights and get a $25 gift card! It will only take 10-15 minutes to help shape the future of the application security industry.
Implemented
👌🏼 Centralized report download: Say goodbye to download chaos! We've created a dedicated space for all your important files. Simply click the new "Downloads" button on the right side of the platform's top bar to access your download history from the last 24 hours. This organized menu allows you to track download progress and effortlessly re-download any files you might need. For now, you'll find your vulnerability reports (executive and technical) ready and waiting. Stay tuned as we expand this feature to include SBOMs and other essential platform resources in the near future!
☁️ Status validation for all cloud environments: Stay ahead of potential problems in your cloud environments! The Environments table in the Scope section now features a dynamic Status column designed to keep you informed. This column proactively shows "Open events" —issues that can disrupt evaluations— across all your AWS, Azure, or GCP environments. Clearly flagging broken or misconfigured settings allows you to address them promptly, ensuring smooth operations and reliable results.
🔄 From Issues Identified to Vulnerable: Until recently, the components at security risk in the inventory of dependencies we offer you in the Supply chain section had the label "Issues Identified." Now, it has changed to "Vulnerable," making it more explicit that vulnerabilities are present. Nonetheless, remember that when we're sure they are exploitable, we add the label "Reachable."
Upcoming
💥 Reachability as a prioritization criterion: Although the "Reachable" tag is currently visible in the Supply chain section for vulnerabilities known to be exploitable, it doesn't yet influence their remediation priority. Given how important reachability is to this process, we'll soon add it as a selectable prioritization factor within the Priority section of your organization's Policies in the platform.
📊 EPSS percentage column: We'll add a column to the Supply chain section's main table that displays the EPSS percentage (Exploit Prediction Scoring System). This value indicates how likely it is that a vulnerability in any of your direct dependencies will be exploited. A higher percentage means a greater likelihood of exploitation. The EPSS score is designed to help you prioritize vulnerability remediation.