May 27, 2025
Automation and Pentesting: Use AI and Open-Source Tools
This article aims to combine automation and pentesting…
March 25, 2025
Car Hacking: How to unlock doors with Doggie
This post will explore a practical use case to demonstrate…
January 7, 2025
CVSS v4: What’s New and Why It Matters for Your Vulnerability Management
In the ever-evolving landscape of cybersecurity, staying…
October 30, 2024
Back to basics: Security recommendations for your team
October is Cybersecurity Awareness Month, a time when we…
July 17, 2024
Using Faraday API for Vulnerability Management
Within our team, we prefer to focus on specific tasks…
December 7, 2023
First steps in cybersecurity: scan your domain
Pentesters use a comprehensive and complete toolkit to…
November 27, 2023
Visualize findings and understand your security posture
Our risk scoring system goes beyond mere criticality…
September 19, 2023
Use Slash Command in Slack to interact with Faraday
In this blog, we are going to create a Slack app to allow…
September 11, 2023
A three-hour session about hacking by our CEO, Federico Kirschbaum
It's true that cybersecurity is primarily something…