New research findings from Faraday goes to DEF CON
PressRed teamOffensive Security
August 11, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…
Faraday latest release – Open Source Penetration Testing and Vulnerability Management Platform
August 5, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…
Cybersecurity is a secondary objective, and that’s what we’ve been getting wrong.
CybersecVulnerability ManagementcloudOffensive Security
August 1, 2022
A programmer is close to a deadline and must work fast. For this one time, they choose to skip certain security protocols. They promise not to do so again but fail to…
Latest Post
Continuous testing, continuous security
We have a very diverse team with strengths in different areas of cybersecurity. We usually work with international companies,…
July 29, 2022
Top 5 security tips: AWS Cloud Infrastructure
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…
July 28, 2022
On the security of IoT devices
According to Cisco’s Annual Internet Report, nearly two-thirds of the global population will have Internet access by 2023. The…
July 27, 2022
Password strength
Passwords are the first aspect of computer security we think about (and for plenty of people, the only one). They are the first…
July 26, 2022
Understanding Spring4Shell
According to Cisco’s Annual Internet Report, nearly two-thirds of the global population will have Internet access by 2023. The…
July 25, 2022
Reverse engineering and game hacking resources
Hi there! You are probably here because you listened to our talk at Nerdearla 2021 and want to continue learning. But if you…
July 20, 2022
Securing open source software (Part 2)
Open-source software increases its presence in data centers, consumer devices, and applications; also, its community continues to…
July 19, 2022
Pentesting toolkit: all you need to know
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…
July 17, 2022