DevSecOps: a thread
Vulnerability ManagementCybersec
March 1, 2023
Let's talk about security into the software development lifecycle. DevSecOPS elp you identify and mitigate security risks early in the development process, reducing the chance of a breach and improving the overall security of their apps.
Release v4.3.3
PentestingVulnerability ManagementLatest Release
March 1, 2023
We are excited to announce the release of our latest update, packed with several new features and improvements designed to enhance your vulnerability management experience
Security Orchestration, the key to Vulnerability Management
PentestingVulnerability Management
February 1, 2023
Whether your IT department or security team needs to operate and protect your system and data, vulnerability management tools are the way to go. They offer the best way to coordinate and automate the process from beginning to end. It is what is called Orchestration. It is one of the key concepts to bear in mind when doing vuln management..
Release v4.3.2
PentestingVulnerability ManagementLatest Release
January 12, 2023
We started 2023 with fresh and new fixes. One of the most awaited features in this release is the "Trending" category to the enrichment field to help you perform a much more accurate risk score.
2022 Recap: our most read article
Offensive SecurityPentestingVulnerability Management
January 9, 2023
A new year means new opportunities but also new vulnerabilities, and we're hoping 2023 gives rise to some much-needed progress and safer coverage of your infrastructure. Whatever happens, Faraday will be there, providing security, unique reporting options, and invaluable research work 24/7.
Reverse Engineering and Exploiting an IoT bug
PentestingVulnerability Management
December 30, 2022
In most of the write-ups of CTF, reverse engineering concepts are taken for granted. This is a problem for newcomers unfamiliar with some basic concepts or If don’t have prior experience in this field. However, this will be different. In this video, we will take you through a step-by-step of our decompiling session using Ghidra. This step-by-step is helpful for any static reversing but is particularly functional for IoT binaries.