Content-Security Policy (CSP) y cómo (no) confiar ciegamente en ella

El Content-Security Policy (CSP) es una de las defensas más…


COD4MW Cheat: A Reverse Engineering Adventure

If you enjoy playing online games, you’ve probably heard…


Automation and Pentesting: Use AI and Open-Source Tools

This article aims to combine automation and pentesting…


Car Hacking: How to unlock doors with Doggie

This post will explore a practical use case to demonstrate…


CVSS v4: What’s New and Why It Matters for Your Vulnerability Management

In the ever-evolving landscape of cybersecurity, staying…


Faraday at Ekoparty 2024: recap

Ekoparty 2024 was more than just a cybersecurity…


Back to basics: Security recommendations for your team

October is Cybersecurity Awareness Month, a time when we…


Using Faraday API for Vulnerability Management

Within our team, we prefer to focus on specific tasks…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…


Privacy Preference Center