2022 Recap: our most read article
![](https://faradaysec.com/wp-content/webp-express/webp-images/uploads/2022/11/reverse-uai-258x194.png.webp)
Our 2022
A new year means new opportunities but also new vulnerabilities, and we’re hoping 2023 gives rise to some much-needed progress and safer coverage of your infrastructure. Whatever happens, Faraday will be there, providing security, unique reporting options, and invaluable research work 24/7.
We did this last year.
2022 was an outstanding year for us: our router investigation made it to DefCon, and we developed quite a collection of articles on the security of IoT devices. Plus many write-ups about CTF and reverse engineering. We also released many enhancements in our platform and articles that explain each new feature in depth.
Before starting out on a new cybersecurity journey, here is a quick recap of the most-read notes of 2022.
Most read articles in 2022
Continuous testing, continuous security
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers
Prioritizing: making your Vulnerability Management Manageable
Pentesting toolkit: all you need to know
Reverse engineering and game hacking resources
Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router
Related Posts
July 17, 2024
Using Faraday API for Vulnerability Management
Within our team, we prefer to focus on specific tasks depending on the type of host and the associated vulnerabilities. Exploiting a…
May 29, 2024
Good practices in Cybersecurity – Part 3
Good security practices go hand in hand with automation, integration, and collaboration. As dynamic as the threat landscape is, so must our…
April 9, 2024
Ten years of cybersecurity, a lifetime of hacking.
Faraday was born from the fusion of entrepreneurial spirit and a desire to break staffs. These elements naturally emerged in Federico…