Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Release v5.7.0

We’ve just released an update that brings significant improvements to Faraday, focusing on solving key challenges in vulnerability management. Here’s what’s new in Release 5.6.0 and Hotfix 5.6.1, and how these enhancements will make your workflow more efficient and secure

Read More


Expanded Attack Surface: How to Optimize Time and Resources in Cybersecurity

Security teams of all sizes, from large Fortune 500 companies to small NGOs, face the same problem: a lack of time and an ever-expanding attack surface. Time to detect vulnerabilities, time to decide what to do, time to act, and time to allocate resources. It is a continuous and constant game in which it is essential to focus on finding a more agile framework to detect, act, and resolve vulnerabilities.

Read More


Using Faraday API for Vulnerability Management

Within our team, we prefer to focus on specific tasks depending on the type of host and the associated vulnerabilities. Exploiting a vulnerability on a third-party server with no connection to a client's internal network is not the same as attacking a cloud-hosted server that could potentially lead to a more interesting compromise, right? Another common example is when performing an internal pentest; our client details the most critical ranges to observe and analyze.

Read More


Our COO Martín Tartarelli talks about Vulnerabilities at UCEMA

Last week, our COO, Martin Tartarelli, offered a master class on vulnerabilities. He thoroughly explained what they are, how they work, and how to manage them. Among other things, he discussed attack surfaces, automation tools, the importance of vulnerability management, and different levels of maturity in an organization.

You can read the full presentation here.

Plus, our CRO Francisco Amato was leading many meeting with Brazilian companies and fellow pentesters. 

It was an amazing chance to connect with the Brazilian pentesting community, share our work, and have an amazing time in São Pablo.

Read More


Release v5.3.2

The redesigned user interface (UI) introduces a more fluid, intuitive, and predictable user experience by minimizing manual tasks and enabling efficient cross-referencing of information.
The UI provides a visually pleasing user journey and navigation experience within and across workspaces. While navigating, users can now get full visualization of their current location.

Read More


Good practices in Cybersecurity – Part 3

Good security practices go hand in hand with automation, integration, and collaboration. As dynamic as the threat landscape is, so must our strategy be. With over 26 thousand vulnerabilities reported last year, it’s now more important than ever to shift security from left to right, and then everywhere.

Read More