Fluid Attacks News logo

News

Subscribe to Updates

Labels

  • All Posts
  • Fix
  • Announcement
  • Improvement
  • new

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • July 2019
Announcementnew
6 months ago

What's new at Fluid Attacks' platform 💫

✨Make your voice heard in the AppSec world!✨

Share your thoughts on Fluid Attacks' solution on Gartner Peer Insights and get a $25 gift card! It will only take 10-15 minutes to help shape the future of the application security industry.

Implemented

👌🏼 Centralized report download: Say goodbye to download dilemmas! We've created a special section on our platform for all downloadable content. Simply click the new "Downloads" button in the top right corner to view everything you've downloaded in the past 12 hours. This handy menu lets you monitor download progress and quickly redownload any required files, such as vulnerability and compliance reports, SBOMs, analytics, and more.

💥 Reachability as a prioritization criterion: As you have noticed, the "Reachable" tag is visible in the Supply chain section for vulnerabilities in your direct dependencies that can be exploited. Now, recognizing the importance of this information for your vulnerability remediation prioritization, we've introduced reachability as a prioritization criterion you can select, among others, within the Priority section of your organization's Policies on the platform.

📊 EPSS percentage column: We've added a column to the main table in the Supply chain section that shows the EPSS percentage (Exploit Prediction Scoring System). This value estimates the probability of a vulnerability in your direct dependencies being exploited. A higher percentage signifies a greater risk of exploitation. The EPSS score is intended to aid your teams in prioritizing vulnerability remediation.

Upcoming

By December 10 at the latest

⛳ Prioritized vulnerabilities table: Enhance your vulnerability management with our forthcoming prioritization feature! Each group will soon have a dedicated section showcasing the top 50 vulnerabilities ranked by priority score. This section will include details such as location, assigned team members, treatment status, and reporting date. This streamlined overview will empower your team to rapidly identify and address the most critical issues, ensuring their remediation efforts align with your organization's policies.

🦠 Malware in dependencies: In the next few days, we will report in the Supply chain section which of your software's dependencies are malicious packages published in open-source package repositories.

🔢 Vulnerabilities per dependency: Soon, you will be able to see in the table of the Supply chain section the number of vulnerabilities that we have recognized in each of your security-affected dependencies.

🧩 Overhauled Jira integration: We will improve the integration of our platform with the bug-tracking system Jira so that you can smoothly and efficiently manage our reports from there. In other words, we will give you greater compatibility with the tools within the Jira ecosystem so that you can keep your security posture management centralized.

Squashed bugs

✔️ Inconsistencies in root registration: First, a repository in a group could have several active branches when, in fact, it should only have one. Second, an active branch associated with a repository could appear in several groups of an organization when, in fact, this association should only appear in one group.

✔️ Issues with free trial accounts and groups: First, some user accounts and groups associated with the free trial were not deleted at the end of the trial when this should happen automatically unless an extension is requested. Second, if the account used remained active on our platform indefinitely, no other user of the same domain could start the free trial. Third, users who had already completed the free trial could re-access the auto-enrollment but not complete it when they really should not have access to it again.

✔️ Wrong status for reported findings: For a specific group on our platform, some identified vulnerabilities appeared in the reporting table of the Vulnerabilities section with the status “Draft” when, in fact, they should have been shown as “Vulnerable.”

Avatar of authordevelopment