December 19, 2022
Prioritizing: making your Vulnerability Management Manageable
We orchestrate many scanners results at Faraday into the…
November 18, 2022
Exploring the Hidden Attack Surface of OEM IoT devices talk
The security of a company’s network also depends on the…
November 9, 2022
Reverse engineering and game hacking resources
If you are curious about reverse engineering, cybersecurity…
November 8, 2022
Our CEO Federico Kirschbaum at Argentina Fintech Forum
“Security is a culture; you set it up, learn from it, and…
September 26, 2022
Our team’s vulnerabilities disclosures 2022
We devote time to reporting vulnerabilities in open-source…
August 1, 2022
Cybersecurity is a secondary objective
A rapidly growing business must choose where to locate its…
July 29, 2022
Continuous testing, continuous security
Cybersecurity as a constant race, in which attackers and…
July 28, 2022
Top 5 security tips: AWS Cloud Infrastructure
Improve your security posture on AWS Read the following…