Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Continuous testing, continuous security

Cybersecurity as a constant race, in which attackers and defenders are always trying to innovate and adapt to new situations. When systems change, attackers find new ways to break them. We see attackers becoming much more agile, intrusive and relentless while we build better and stronger defenses. Our goal is to be one step ahead. %

Read More


Top 5 security tips: AWS Cloud Infrastructure

Improve your security posture on AWS Read the following recommendations and tips below to avoid these common cloud security issues. Top 5

Read More


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly two-thirds of the global population will have Internet access by 2023. The number of devices connected to IP networks will be more than three times the number of people in the world. The consumer segment will have a nearly three-fourths share of total devices and connections. Moreover, IoT devices will account for 50 percent of all networked devices, and about a third will be wireless.

Read More


Password strength

Passwords are the first aspect of computer security we think about (and for plenty of people, the only one). They are the first approach for most of us in cybersecurity: our first CTF challenges, brute force attacks on wifi connections, cryptography lessons about hash validations and more — they all revolve around them.

Read More


Securing open source software (Part 2)

Open-source software increases its presence in data centers, consumer devices, and applications; also, its community continues to grow. Despite the code being available, memory safety issues persist in popular software. Our research team started a new quest to find and report vulnerabilities in the open-source projects we use every day. This is the second part of that job, where they share with us the strategy they used to find these bugs: coverage guided fuzzing.

Read More