Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Release v4.3.0

Great news: We're releasing some awesome cybersecurity new…


Integrating Faraday in the software development process – GitLab – Part 4

Pentesters use a comprehensive and complete toolkit to…


Integrating Faraday in the software development process – Jenkins – Part 2

We are going to integrate Jenkins into Faraday with…


Integrating Faraday in the software development process – Travis – Part 3

Pentesters use a comprehensive and complete toolkit to…


Integrating Faraday in the software development process – GitHub – Part 1

Pentesters use a comprehensive and complete toolkit to…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Exploring the Hidden Attack Surface of OEM IoT devices live talk – English & Spanish

The security of a company’s network also depends on the…


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…