Fluid Attacks News logo

News

Subscribe to Updates

Labels

  • All Posts
  • Fix
  • Announcement
  • Improvement
  • new

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • July 2019
Product Roadmap
In Review
VEX Support
new
In Progress
Azure integration
new
Container images analysis
new
PHP SAST Suppport
new
Platform redesign
new
CVSS 4.0 in our platform
new
new
2 years ago

Learn more about the new section called ports!

Do you want to see what ports of your application have vulnerabilities or if it's safe? This information is provided by Ports, which you can find in the third tab of the surface section. Thanks to this information, you will be able to see in a summarized form the status of your application, showing you in detail information such as the IP Address, when the vulnerability was detected, if it is still present in your analysis, etc.

You can enter here if you want to know more about this section. At Fluid Attacks, we work daily to increase the flexibility and practicality of our ARM platform. Remember that your opinion is important to us. We invite you to comment on this post or email us at help@fluidattacks.com.

Avatar of authorMaria Fernanda Toro
new
2 years ago

Know how many days are left until the Temporarily Accepted treatment ends

With the new Temporary treatment alert notification, it will report the vulnerabilities with the temporarily accepted treatment having seven or fewer days to the end of this treatment, grouping in a single email the groups and you are, helping us to have follow-up and control of the vulnerabilities that you have assigned and thus to be able to give a solution before it expires.

We invite you to subscribe to our News channel, where we post information weekly on new features and improvements to our ARM platform.

Avatar of authorMaria Fernanda Toro
new
2 years ago

Get to know what Scope overview metrics are all about!

Scope overview is the new metrics you can see in the Groups section in the ARM platform. Here you can see four boxes, the first two, Covered Authors and Repositories, show us the total number of authors and repositories active in the source code analysis.

Now Missed Authors and Repositories are the following two boxes which are the number of authors and repositories that are not included in the source code analysis. These repositories are evidenced through the Out of Scope section, which is part of Azure DevOps pat credentials. Thanks to these metrics, you can quickly visualize which repositories are not included in the analysis.

Avatar of authorMaria Fernanda Toro
new
2 years ago

Get to know the new section of the ARM Azure Credentials!

Do you know the new ARM section called Out of Scope? With this, you can add repositories that already have Azure DevOps PAT (Personal Access Token) credentials added. Here you can specify to which group will add the selected repository for source code analysis.

You can click here if you want to know how to add repositories. We invite you to leave us your opinion by writing us in the post or emailing at help@fluidattacks.com.

Avatar of authorMaria Fernanda Toro
new
2 years ago

Do you know that you can add Azure credentials to the ARM?

We are pleased to announce that you can now add Azure credentials in the scope section or Global credentials. You can find out which repositories are not being analyzed by looking at that information in the Out of Scope section. Thanks to this, you can specify what kind of credentials and repositories you want to be taken into your source code analysis.

You can enter here if you want to know more about this section. Let us know in your comments what you think about this improvement by writing us in the post or by emailing us at help@fluidattacks.com.

Avatar of authorMaria Fernanda Toro
new
2 years ago

Know more about our new notification Consulting digest

We are pleased to announce the new notification called Consulting digest, which will be announced in a daily report of the comments made in the consulting sections (at the group, event, and vulnerability levels). Thanks to this implementation, you will be able to receive an email compiling all this information, reducing your number of comments emails daily.


If you want to know more about the notification matrix, we invite you to follow this link and subscribe to our News channel.

Avatar of authorMaria Fernanda Toro
Announcement
2 years ago

Learn more about our Accepted Vulnerabilities by User Chart

On the ARM, it is possible to know how many vulnerabilities a specific user has accepted by Accepted vulnerabilities by user chart. To find it, scroll down the Analytics sections of your organizations, groups, or portfolios. Here you can see the users who have accepted the vulnerabilities either temporarily or permanently accepted. This information can help manage vulnerability treatments.

Remember that your opinion is important to us. We invite you to comment on this post or email us at help@fluidattacks.com and subscribe to our News channel.

Avatar of authorMaria Fernanda Toro
Announcement
2 years ago

Do you need to change your group information? Here we show you how!

Do you know what the information section located in the scope tab is? In this section, you can edit your information about the group. You can add or change information such as Language, Description, Business Registration Number, Business Name, Sprint Length, Sprint Start Date, and managed. Just click on the edit button, which will open the pop-up window where you can easily change these. We invite you to click here if you want to know more about this section.

We invite you to subscribe to our News channel, where we post information weekly on new features and improvements to our ARM platform.

Avatar of authorMaria Fernanda Toro
Announcement
2 years ago

Display the data you want in the Lines table.

Manipulating the data displayed in the Lines tab tables in the Surface section can be done by using the Columns filter. This helpful filter helps us to show or not to show specific columns that are not of significant importance based on the need. With a simple click on Columns, you can select the filters you want to use. Thanks to this feature, you can visualize the data you want in the table and make it visually easier to find information of interest.

At Fluid Attacks, we work daily to increase the flexibility and practicality of our platform. Remember that your opinion is important to us. We invite you to comment on this post or email us at help@fluidattacks.com.


Avatar of authorMaria Fernanda Toro
Announcement
2 years ago

Learn more about the standard we’re applying: NIST 800-115

Every day we are working to improve our users' Security Standards we are implementing in Fluid Attacks. The standard we want to talk about today is NIST 800-115 is an overview of the key elements of security testing. It directs organizations on planning and conducting technical information security testing, analyzing the findings, and developing remediation strategies.

The version used in this section is NIST 800-115 September 2008. You can find this and other standards we apply in Fluid Attacks in the Docs/compliance section.

Avatar of authorMaria Fernanda Toro