Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Faraday latest release – Open Source Penetration Testing and Vulnerability Management Platform

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Cybersecurity is a secondary objective, and that’s what we’ve been getting wrong.

A programmer is close to a deadline and must work fast. For this one time, they choose to skip certain security protocols. They promise not to do so again but fail to…

Read More


Latest Post

Continuous testing, continuous security

We have a very diverse team with strengths in different areas of cybersecurity. We usually work with international companies,…


Top 5 security tips: AWS Cloud Infrastructure

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly two-thirds of the global population will have Internet access by 2023. The…


Password strength

Passwords are the first aspect of computer security we think about (and for plenty of people, the only one). They are the first…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly two-thirds of the global population will have Internet access by 2023. The…


Reverse engineering and game hacking resources

Hi there! You are probably here because you listened to our talk at Nerdearla 2021 and want to continue learning. But if you…


Securing open source software (Part 2)

Open-source software increases its presence in data centers, consumer devices, and applications; also, its community continues to…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…