Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Improve visibility with Slash Command in Slack to interact with Faraday

In this blog, we are going to create a Slack app to allow us to interact with Faraday API using its known Slash Commands. This allows for flexibility in performing various security tasks and queries directly from Slack. Providing visibility into Faraday's data and functionality within the Slack environment. Helping security teams stay informed.

Read More


A three-hour session about hacking by our CEO, Federico Kirschbaum

It's true that cybersecurity is primarily something developed by governments and large, regulated companies. If these entities with vast resources, hefty budgets, and seniority still experience breaches, what's left for the rest of us?
Whether it's a company with 10,000 employees or one with just five, they both face exactly the same attack.

Read More


Our CEO Federico Kirschbaum moderated a panel on Cybersecurity in the Blockchain and Web3

Our CEO Federico Kirschbaum participated as a moderator in the “Cybersecurity” panel at Ethereum Argentina, alongside Pablo G. Sabbatella, Santiago Di Paolo, Sergio Demian Lerner, and Sebastian Raul Wain.
He was in charge of joining the conversation of one of the hottest topics in the crypto world.
See the video of the talk

Read More


Delivering Client-Ready Reports: Optimizing Penetration Testing Workflow with Zoho and Faraday Integration

Integrating Zoho CRM, Zoho Projects, and Faraday into your penetration test service workflow can significantly streamline the process from lead generation to delivering the final report to the client. This well-coordinated approach enhances efficiency, communication, and client satisfaction throughout the engagement. By following the steps outlined in this blog post, you can effectively manage penetration test projects and maintain a high standard of service delivery.

Read More


Our COO Martin Tartarelli was in charge of an online workshop on Prioritization

In his own words, Martin stated, “Attempting to address all critical vulnerabilities is a mistake, especially for large companies. Are they all equally critical? It's crucial to assess the context within vulnerability management platforms to prioritize effectively.”

Read More


Release v4.5.2

We're delighted to present to you our newest release, version 4.5.0, along with essential updates 4.5.1 and 4.5.2. This update brings with it an array of compelling improvements, and performance boosts, that will enhance your experienc

Read More