Bugs and working from home, an interview with Federico Kirschbaum
June 7, 2023
The research states that the team was "seeking and reporting security vulnerabilities in IoT devices, which led to the finding of an exploitable bug in a consumer-grade router popular in Argentina." They also stated in the research that it was escalating quickly and shares about how protecting home networks is important while working remotely.
Bypassing certificate pinning with Gabriel Franco
June 5, 2023
Many apps implement a security feature called Certificate Pinning, creating some problems when trying to intercept the traffic between the application and the server. Today, we’ll cover the basics about that and give some examples of how to bypass it using an Android mobile.
Our co-founder Francisco Amato in Sepa’s night
PressVulnerability ManagementCybersec
June 1, 2023
Our CRO Francisco Amato was part of Sepa's Night. Watch the streaming!
Our CEO Federico Kirschbaum at Buenos Aires City Legislature
June 1, 2023
After a cyber-attack on Buenos Aires City Legislature's infrastructure in 2022, they decided to take a greater step toward cybersecurity awareness. They organized a meetup with our CEO Federico Kirschbaum and Defy Education founder Pablo G. Sabbatella.
This showcases their willingness and commitment to the security and privacy standards, a mission that is also very dear to us.
Faraday Red team goes to Chile with Ekoparty training
June 1, 2023
The primary objective of this training is to equip students with the ability to identify and analyze potential exposures that a company may face.
Their expertise in identifying exposures, understanding internal protocols, and implementing efficient security measures will make them invaluable assets in today's digital world, where companies must remain constantly vigilant to protect their operations, reputation, and data.
Faraday Vulnerability management platform: a seamless experience
PentestingVulnerability Management
May 29, 2023
Vuln management users seek to have a general, orderly and clear vision of the health in their security systems in order to assess and mitigate existing vulnerabilities.
They look for the platform that helps them identify and catalog vulnerabilities, separate what is urgent and important from what is secondary, classify them according to their severity and thus be able to assess the risk of their systems and networks.





