Draft:Fluid Attacks
![]() | Review waiting, please be patient.
This may take 8 weeks or more, since drafts are reviewed in no specific order. There are 2,952 pending submissions waiting for review.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
Reviewer tools
|
Submission declined on 24 August 2025 by Caleb Stanford (talk). This submission appears to read more like an advertisement than an entry in an encyclopedia. Encyclopedia articles need to be written from a neutral point of view, and should refer to a range of independent, reliable, published sources, not just to materials produced by the creator of the subject being discussed. This is important so that the article can meet Wikipedia's verifiability policy and the notability of the subject can be established. If you still feel that this subject is worthy of inclusion in Wikipedia, please rewrite your submission to comply with these policies. This submission does not appear to be written in the formal tone expected of an encyclopedia article. Entries should be written from a neutral point of view, and should refer to a range of independent, reliable, published sources. Please rewrite your submission in a more encyclopedic format. Please make sure to avoid peacock terms that promote the subject.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
This draft has been resubmitted and is currently awaiting re-review. | ![]() |
Comment: The entire article is written from a promotional/corporate tone. Needs to be scrapped and rewritten. Caleb Stanford (talk) 16:25, 24 August 2025 (UTC)
Company type | Private |
---|---|
Industry | Application security |
Founded | 2001 |
Founders |
|
Key people | Vladimir Villa (CEO) |
Website | fluidattacks |
Fluid Attacks is an application security (AppSec) company founded in 2001 in Colombia.[1][2] It specializes in security testing for software development companies through automated tools (SaaS) and penetration testing.[3][4][5]
History
[edit]Fluid Attacks was founded in 2001 by Mauricio Gómez, Rafael Álvarez, David Cardona, and Luis Bustamante, initially under the name Fluidsignal. The company began by providing the setup of secure networks, mainly based on Linux. In 2003, they decided to merge with another firm working with Linux, owned by entrepreneur Juan Guillermo Olarte, and changed their name to Fluidsignal Group.[2]
At first, Fluidsignal Group designed, installed, and customized systems. However, in 2008, the team narrowed its offering and focused on providing IT security, including penetration testing and consulting. Shortly thereafter, Fluidsignal Group achieved ISO 9001 and 27001 certifications. Between 2011 and 2012, the group decided to limit its portfolio to penetration testing or ethical hacking only.[2]
In 2014, the company participated in Ruta N's internationalization program. It started developing software for automated security tests and a vulnerability management platform. In 2016, recognizing itself as an offensive security team, the company changed its name to Fluid Attacks.[2] In 2021, Fluid Attacks became an authorized company to assign unique CVE codes to the vulnerabilities it detected (i.e., CVE Numbering Authority, CNA, under the Researcher category).[6]
In 2022, Fluid Attacks's open-source CLI for SAST-type scans[7] was approved as a free tool for validating tier 2 requirements of the Alliance's Cloud Application Security Assessment (CASA) framework.[8] That same year, at Black Hat USA, Fluid Attacks unveiled its open-source tool Makes, which was used to create isolated application environments for continuous integration/continuous deployment (CI/CD).[9] This project, along with Fluid Attacks's core software repository, obtained a gold badge from the Open Source Security Foundation (OpenSSF).[10]
Operations and strategy
[edit]Fluid Attacks has been a self-funded company since inception.[11] It develops cybersecurity solutions primarily for industries such as banking, finance, technology, healthcare, and transportation.[1] Fluid Attacks follows the DevSecOps approach,[12] carrying out automatic and manual security tests—the latter to overcome the limitations of automated tools[4][13][14][15]—throughout the software development lifecycle.[5]
In 2019, Fluid Attacks began incorporating artificial intelligence into its products and operations.[1] At that time, it developed technology to evaluate repositories and identify which files were most likely to have vulnerabilities, allowing its pentesters to prioritize them for assessment.[16] In 2023, Fluid Attacks started to increase the use of generative AI in its products, especially for the automatic remediation of vulnerable code.[11][17]
Research and training
[edit]Since becoming a CNA, Fluid Attacks submits to the US National Vulnerability Database (NVD).[6]
According to a 2021 article in Business Empresarial, the company has one of the largest red teams in the Americas.[18] It has sponsored members of its team to participate in international hacking contests (e.g., CTF) and cybersecurity events. In 2023, Fluid Attacks was one of the sponsors of the Latin American team in the International Cybersecurity Challenge.[19]
See also
[edit]- Application security
- List of tools for static code analysis
- Penetration testing
- Software composition analysis
- Static application security testing
References
[edit]- ^ a b c "Fluid Attacks expone beneficios de las pruebas de seguridad en las empresas". Valora Analitik. 2022-09-19. Retrieved 2025-07-24.
- ^ a b c d Raventós, J. I. (2022-06-01). Colombia Origen de Software (in Spanish). Fedesoft. pp. 100–107. ISBN 978-628-95029-2-3.
- ^ "Pentesting as a service: Analizar la seguridad desde la postura del atacante". Gerencia. 2022-10-20. Retrieved 2025-08-08.
- ^ a b "Cómo el PTaaS (pruebas de penetración) está transformando la ciberseguridad en España". Revista Ciberseguridad. 2025-06-09. Retrieved 2025-07-24.
- ^ a b "State of Attacks: Fluid Attacks publica su reporte anual de ciberseguridad". Business Empresarial. 2022-08-09. Retrieved 2025-08-04.
- ^ a b Pérez, L. B. (2021-06-17). "Fluid Attacks recibe autorización de Mitre para asignar códigos a vulnerabilidades encontradas en AL". ComputerWeekly.es. Retrieved 2025-08-05.
- ^ "Source Code Analysis Tools". OWASP. Retrieved 2025-08-11.
- ^ "Tier 2 - Recommended Tools". App Defense Alliance. Retrieved 2025-08-11.
- ^ Osores, M. (2022-08-16). "Fluid Attacks presentó Makes en Black Hat USA 2022". ComputerWeekly.es. Retrieved 2025-08-11.
- ^ "Universe". OpenSSF Best Practices. Retrieved 2025-08-11.
- ^ a b "Fluid Attacks, la colombiana que llevó su headquarter a San Francisco, entrega sus claves". Startups Latam. 2023-10-10. Retrieved 2025-07-25.
- ^ "Seis buenas prácticas de ciberseguridad para implementar en las empresas en el 2023". Business Empresarial. 2023-02-12. Retrieved 2025-08-02.
- ^ Pantaleón, I. (2022-11-22). "Fluid Attacks: Seis tendencias de ciberseguridad para el 2023". Forbes Centroamérica. Retrieved 2025-07-29.
- ^ "5 recomendaciones para elegir un equipo de pentesting". Business Empresarial. 2021-07-04. Retrieved 2025-08-05.
- ^ "5 tendencias que se impondrán en la ciberseguridad empresarial para el 2021". Business Empresarial. 2020-12-25. Retrieved 2025-08-06.
- ^ "Uso de machine learning en ciberseguridad identifica archivos con vulnerabilidades de manera eficiente". Business empresarial. 2021-01-14. Retrieved 2025-08-06.
- ^ "Siete tendencias en ciberseguridad y ciberataques para el 2024". Business Empresarial. 2024-01-09. Retrieved 2025-07-29.
- ^ "Fluid Attacks primera y única compañía en Latinoamérica autorizada para asignar códigos a las vulnerabilidades encontradas". Business Empresarial. 2021-07-09. Retrieved 2025-08-05.
- ^ "17 jóvenes hackers representarán a Latinoamérica en el International Cybersecurity Challenge". Business Empresarial. 2023-07-11. Retrieved 2025-07-31.