¿Tu empresa esta preparada para la nueva ley de ciberseguridad de Chile?
Offensive SecurityVulnerability ManagementCybersec
June 17, 2025
Desde este año entró en vigencia una ley modelo de ciberseguridad en Chile. La tomamos como referencia para desarrollar medidas clave que te ayuden a mantener seguros los datos de tu empresa, y también para contarte cómo podemos ayudarte a cumplir con esta nueva normativa.
Advisory: Multiple vulnerabilities affecting Draytek routers
March 11, 2025
Routers are critical to modern networks, acting as the gateway between local devices and the broader internet. Their strategic position makes them an attractive target for attackers seeking persistent access, data interception, or further exploitation of internal networks. Despite their importance, many routers suffer from outdated firmware, weak security, and a lack of patching.
Car Hacking with Doggie at H2HC!
Offensive SecurityOpen SourceResearch
February 25, 2025
Last month, Doggie took the stage at the Car Hacking Village during the H2HC conference on December 13th and 14th in São Paulo. This exciting village featured various presentations and workshops exploring the world of automotive security. The Faraday team showcased Doggie in a uniquely interactive way, allowing attendees to dive into CAN Bus exploration hands-on.
Good practices in Cybersecurity – Part 3
Offensive SecurityRed teamCybersec
May 29, 2024
Good security practices go hand in hand with automation, integration, and collaboration. As dynamic as the threat landscape is, so must our strategy be. With over 26 thousand vulnerabilities reported last year, it’s now more important than ever to shift security from left to right, and then everywhere.
Good practices in Cybersecurity – Part 2
Offensive SecurityRed teamCybersec
March 12, 2024
Nowadays, we can distinguish various branches within a security team Red Teams, Blue Teams, Purple Teams & Bug Hunters.
But what does each team do?
This difference in colors, adding a new category related to bug bounty, makes us think about common tasks that all these approaches can have within a company; and the truth is, they have a lot. First, let's talk about the definition of each one.
Tips Nmap Script Engine
Offensive SecurityRed teamPentestingVulnerability Management
June 28, 2023
Nmap (Network Mapper) is a popular network scanner that allows discovering ports and services, providing relevant information about a network. In addition to basic port scanning, Nmap offers a wide range of options and advanced functionalities. It can perform TCP, UDP, and SCTP scans, operating system detection scans, service version detection, script scans, and much more. It also allows customization of scans and generation of detailed reports.