Fluid Attacks News logo

News

Subscribe to Updates

Labels

  • All Posts
  • Fix
  • Announcement
  • Improvement
  • new

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • July 2019
Product Roadmap
In Review
VEX Support
new
In Progress
Azure integration
new
Container images analysis
new
PHP SAST Suppport
new
Platform redesign
new
CVSS 4.0 in our platform
new
Announcement
a year ago

πŸ’‘Four Key Functionalities of the Vulnerability Section

Do you know the functionalities offered by the Vulnerabilities section? In total, we have four of them: 

  • Columns filter: This allows you to filter the columns in the table to customize the information displayed.
  • Filters: filter the columns in the table to customize the information displayed.
  • Generate report: Allows to generate reports (technical or executive) with the data.
  • Search bar: Provides a search bar to find specific information quickly and efficiently.
Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Has a root been moved from one of your groups? Stay informed with the notification Root Moved! πŸ“’

Our Platform's flexibility makes it possible to correct errors such as creating a root in the wrong group. We know it is helpful to know about any change concerning your roots. That's why you can enable Root updates notifications, which will send you a Root Moved email whenever a root is moved to another group.

To activate Root updates, you can do so through our notification matrix by clicking on User Menu -> Notifications -> Root updates. Remember to subscribe to our News channel to stay updated on all our announcements!

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

πŸ€” What chart can you visualize vulnerability distribution by group? Here we tell you! πŸ“£

In our platform, you can easily assess the distribution of reported vulnerabilities among your various groups. The Vulnerabilities by Group pie chart displays the percentage of vulnerabilities attributed to each group, considering both open and closed cases within your organization. 

You can access this chart in the Analytics section for your organizations and portfolios. Please note that the chart's names and values may vary depending on the specific section you are currently browsing. We invite you to subscribe to our News channel to follow our weekly announcements.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Learn more about the standard we’re applying: NIST 800-53 πŸ“šπŸ’»

Every day, we work to improve the Security Standards we implement in Fluid Attacks. Today, we want to share the standard NIST 800-53, which defines the standards and guidelines for federal agencies to architect and manage their information security systems. It was established to guide the protection of agencies and citizen's private data.

The version used for this section is NIST 800-53, Rev. 5, September 2020. You can find this and other standards we are applying in the Compliance section of our Documentation.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Find your group quickly with Filter button πŸš€

In the Group section of our Platform, you'll find a Filters button that lets you refine your group search by group name or plan. This handy filter helps you save time and get to work in your group right away.

For you not to miss any of these announcements, we invite you to subscribe to our News channel. Don't forget, filters speed up your searches 🚀

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Say Goodbye to Surprises: Get a 7-Day Agent Token Alert! 🚨

Has the expiration of your Agent token caught you off guard? Not anymore! At Fluid Attacks, we've implemented the DevSecOps Expiration notification, where you can get a 7-day notice before your agent token expires. 

Say goodbye to last-minute hassles and hello to seamless operations! 🚀

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Do you know the information provided by the Oldest Vulnerabilities graph?

Have you ever wondered about a chart highlighting the vulnerabilities that have remained open for the most extended duration? Look no further! You can now access this valuable chart on the platform under the label Oldest Vulnerability Types.

With this chart, you can quickly identify the longest-standing vulnerabilities in your system, allowing you to prioritize remediation in alignment with your organization's specific needs and goals. 

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Learn more about the standard we’re applying: NERC CIP πŸ“–πŸ’‘πŸ“

We are excited to present the security standards we apply at Fluid Attacks. One of these standards is the North American Electric Reliability Corporation (NERC) develops Reliability Standards through an industry-driven, ANSI-accredited process, which guarantees openness to all individuals who are directly and significantly impacted by the reliability of the North American bulk power system.

The version used in this section is the NERC CIP v5 Standards. You can find this and other standards we are applying in the Compliance section of our Documentation.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Check out what data is shown in the Vulnerabilities table πŸ‘€πŸ”

The table in the vulnerabilities section provides detailed information about the vulnerabilities reported in your group. It contains several columns that allow you to customize the information displayed using the column filter button.

The data in this table include Type - Status - Severity - % Risk exposure, among others. You can refer to our official documentation for a better understanding of this information. Remember to subscribe to our News channel to stay updated on all our announcements!

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Stay informed: Follow treatment updates with our notification πŸ“¬

Are you familiar with our Treatment Updates Notification? This feature keeps you informed whenever new treatments are introduced or changes are made to existing treatments within your organization. It's designed to ensure you stay up-to-date on any modifications related to treatments.

If you want to know more about our notification matrix system you can access our official documentation.

Avatar of authorMaria Fernanda Toro