2022 Recap: our most read article
Our 2022
A new year means new opportunities but also new vulnerabilities, and we’re hoping 2023 gives rise to some much-needed progress and safer coverage of your infrastructure. Whatever happens, Faraday will be there, providing security, unique reporting options, and invaluable research work 24/7.
We did this last year.
2022 was an outstanding year for us: our router investigation made it to DefCon, and we developed quite a collection of articles on the security of IoT devices. Plus many write-ups about CTF and reverse engineering. We also released many enhancements in our platform and articles that explain each new feature in depth.
Before starting out on a new cybersecurity journey, here is a quick recap of the most-read notes of 2022.
Most read articles in 2022
Continuous testing, continuous security
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers
Prioritizing: making your Vulnerability Management Manageable
Pentesting toolkit: all you need to know
Reverse engineering and game hacking resources
Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router
Related Posts
April 9, 2024
Enhanced Vulnerability Management Guide Using Open-Source Tools
In the dynamic world of IT security, proactive vulnerability management is key. This comprehensive guide introduces steps to set up an…
March 12, 2024
Good practices in Cybersecurity – Part 2
Nowadays, we can distinguish various branches within a security team Red Teams, Blue Teams, Purple Teams & Bug Hunters. But what does each…
February 15, 2024
Good practices in Cybersecurity – Part 1
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They…