Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Use Slash Command in Slack to interact with Faraday

In this blog, we are going to create a Slack app to allow us to interact with Faraday API using its known Slash Commands. This allows for flexibility in performing various security tasks and queries directly from Slack. Providing visibility into Faraday's data and functionality within the Slack environment. Helping security teams stay informed.

Read More


A three-hour session about hacking by our CEO, Federico Kirschbaum

It's true that cybersecurity is primarily something developed by governments and large, regulated companies. If these entities with vast resources, hefty budgets, and seniority still experience breaches, what's left for the rest of us?
Whether it's a company with 10,000 employees or one with just five, they both face exactly the same attack.

Read More


Cybersecurity in the Blockchain and Web3 by Federico Kirschbaum

Our CEO Federico Kirschbaum participated as a moderator in the “Cybersecurity” panel at Ethereum Argentina, alongside Pablo G. Sabbatella, Santiago Di Paolo, Sergio Demian Lerner, and Sebastian Raul Wain.
He was in charge of joining the conversation of one of the hottest topics in the crypto world.
See the video of the talk

Read More


Optimize reporting by integrating Faraday into Zoho.

Integrating Zoho CRM, Zoho Projects, and Faraday into your penetration test service workflow can significantly streamline the process from lead generation to delivering the final report to the client. This well-coordinated approach enhances efficiency, communication, and client satisfaction throughout the engagement. By following the steps outlined in this blog post, you can effectively manage penetration test projects and maintain a high standard of service delivery.

Read More


Prioritization by our COO Martin Tartarelli

In his own words, Martin stated, “Attempting to address all critical vulnerabilities is a mistake, especially for large companies. Are they all equally critical? It's crucial to assess the context within vulnerability management platforms to prioritize effectively.”

Read More


Release v4.5.2

We're delighted to present to you our newest release, version 4.5.0, along with essential updates 4.5.1 and 4.5.2. This update brings with it an array of compelling improvements, and performance boosts, that will enhance your experienc

Read More