Automatización y Pentesting: Usa la IA y herramientas Open-Source
May 13, 2025
Este artículo tiene como objetivo combinar la automatización y metodologías de pentesting de forma práctica, usando inteligencia artificial y múltiples herramientas opensource. Más que un simple repaso de comandos, se trata de compartir una metodología replicable, flexible y accesible.
Federico Kirschbaum at the Santiago Chamber of Commerce: key insights on cybersecurity
April 21, 2025
Nuestro CEO y cofundador, Federico Kirschbaum presentó una charla exclusiva para la Cámara de Comercio de Santiago (CCS), en Chile. En esta oportunidad compartió datos y consejos fundamentales para mantener la seguridad personal y también profundizó sobre los principales desafíos en ciberseguridad, vulnerabilidades actuales.
Doggie: A Must-Have Open Source Tool for Car Hacking and Automotive Security
February 4, 2025
To make automotive cybersecurity research more accessible and affordable, we developed Doggie, an open-source and modular CAN Bus - USB adapter. Whether you're a hobbyist, researcher, or professional, Doggie is designed to simplify working with CAN Bus networks, enabling secure exploration and development in the automotive space.
Faraday at Ekoparty 2024: recap
November 22, 2024
Ekoparty 2024 was more than just a cybersecurity conference—it became a hub for knowledge sharing, community building, and celebrating the latest discoveries and innovations. Our team played a prominent role across various sessions, showcasing not only their technical expertise but also their commitment to the community.
Back to basics: Security recommendations for your team
October 30, 2024
October is Cybersecurity Awareness Month, a time when we focus on ways to enhance security in our daily lives, both personally and, most importantly, as a company. While some measures may seem basic, it’s important to remember that many vulnerabilities stem from unpatched programs, and a large number of attacks originate from an employee clicking the wrong link.
Maturity Models in Vulnerability Management: Where Are You At?
Vulnerability ManagementCybersec
October 7, 2024
Since organizations differ in size, structure, and maturity, there are various vulnerability management models tailored to each. These strategies, adapted to different levels of complexity, are not a one-size-fits-all solution, but rather a set of recommended steps to either build a Vulnerability Management Program (VMP) from the ground up or assess the maturity of an existing VMP. The ultimate goal is to reach a point where vulnerability management no longer feels like a burden, but instead leads to significant improvements in overall security.