Security Orchestration, the key to Vulnerability Management

Whether your IT department or security team needs to…


Release v4.3.2

We started 2023 with fresh and new fixes. One of the most…


2022 Recap: our most read article

A new year means new opportunities but also new…


Reverse Engineering and Exploiting an IoT bug

In most of the write-ups of CTF, reverse engineering…


Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Release v4.3.0

Great news: We're releasing some awesome cybersecurity new…


Faraday in the software development process – GitLab – Part 4

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – Jenkins – Part 2

We are going to integrate Jenkins into Faraday with…


Faraday in the software development process – Travis – Part 3

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – GitHub – Part 1

Pentesters use a comprehensive and complete toolkit to…