This article is an orphan, as no other articles link to it . Please introduce links to this page from related articles . (November 2025) |
| | |
| Company type | Private |
|---|---|
| Industry | Application security |
| Founded | 2001 |
| Founders |
|
Key people | Vladimir Villa (CEO) |
| Website | fluidattacks |
Fluid Attacks is an application security (AppSec) company founded in 2001 in Colombia. [1] [2] It specializes in security testing for software development companies through automated tools (SaaS) and penetration testing (PTaaS). [3] [4] [5]
Fluid Attacks was founded in 2001 by Mauricio Gómez, Rafael Álvarez, David Cardona, and Luis Bustamante, initially under the name Fluidsignal. The company began by providing the setup of secure networks, mainly based on Linux. In 2003, they decided to merge with another firm working with Linux, owned by entrepreneur Juan Guillermo Olarte, and changed their name to Fluidsignal Group. [2]
At first, Fluidsignal Group designed, installed, and customized systems. However, in 2008, the team narrowed its offering and focused on providing IT security, including penetration testing and consulting. Shortly thereafter, Fluidsignal Group achieved ISO 9001 and 27001 certifications. Between 2011 and 2012, the group decided to limit its portfolio to penetration testing or ethical hacking only. [2]
In 2014, the company participated in Ruta N's internationalization program. It started developing software for automated security tests and a vulnerability management platform. In 2016, recognizing itself as an offensive security team, the company changed its name to Fluid Attacks. [2] In 2021, Fluid Attacks became an authorized company to assign unique CVE codes to the vulnerabilities it detected (i.e., CVE Numbering Authority, CNA, under the Researcher category). [6]
In 2022, Fluid Attacks's open-source CLI for SAST-type scans [7] was approved as a free tool for validating tier 2 requirements of the Alliance's Cloud Application Security Assessment (CASA) framework. [8] That same year, at Black Hat USA, Fluid Attacks unveiled its open-source tool Makes, which was used to create isolated application environments for continuous integration/continuous deployment (CI/CD). [9] This project, along with Fluid Attacks's core software repository, obtained a gold badge from the Open Source Security Foundation (OpenSSF). [10]
Fluid Attacks has been a self-funded company since its inception. [11] It develops tools (e.g., a scanner for SAST, SCA, and DAST) [12] and cybersecurity solutions primarily for industries such as banking, finance, technology, healthcare, and transportation. [1] Fluid Attacks follows the DevSecOps approach, [13] carrying out automatic and manual security tests—the latter to overcome the limitations of automated tools [4] [14] [15] [16] —throughout the software development lifecycle. [5]
In 2019, Fluid Attacks began incorporating artificial intelligence into its products and operations. [1] At that time, it developed technology to evaluate repositories and identify which files were most likely to have vulnerabilities, allowing its pentesters to prioritize them for assessment. [17] In 2023, Fluid Attacks started to increase the use of generative AI in its products, especially for the automatic remediation of vulnerable code. [11] [18]
Since becoming a CNA, Fluid Attacks submits to the US National Vulnerability Database (NVD). [6]
According to a 2021 article in Business Empresarial, the company has one of the largest red teams in the Americas. [19] It has sponsored members of its team to participate in international hacking contests (e.g., CTF) and cybersecurity events. Since 2023, Fluid Attacks has been one of the sponsors of the Latin American team in the International Cybersecurity Challenge. [20] [21]