Automation and Pentesting: Use AI and Open-Source Tools

This article aims to combine automation and pentesting…


Car Hacking: How to unlock doors with Doggie

This post will explore a practical use case to demonstrate…


CVSS v4: What’s New and Why It Matters for Your Vulnerability Management

In the ever-evolving landscape of cybersecurity, staying…


Faraday at Ekoparty 2024: recap

Ekoparty 2024 was more than just a cybersecurity…


Back to basics: Security recommendations for your team

October is Cybersecurity Awareness Month, a time when we…


Using Faraday API for Vulnerability Management

Within our team, we prefer to focus on specific tasks…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…


Use Slash Command in Slack to interact with Faraday

In this blog, we are going to create a Slack app to allow…


A three-hour session about hacking by our CEO, Federico Kirschbaum

It's true that cybersecurity is primarily something…


Privacy Preference Center