Release v5.7.0

We’ve just released an update that brings significant…


Maturity Models in Vulnerability Management: Where Are You At?

Since organizations differ in size, structure, and…


Expanded Attack Surface: How to Optimize Time and Resources in Cybersecurity

Security teams of all sizes, from large Fortune 500…


Using Faraday API for Vulnerability Management

Within our team, we prefer to focus on specific tasks…


Ten years of cybersecurity, a lifetime of hacking.

Faraday was born from the fusion of entrepreneurial spirit…


Good practices in Cybersecurity – Part 1

Pentesters use a comprehensive and complete toolkit to…


Farewell 2023

But the outcome of all that is so rewarding. It only placed…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…


Release v4.6.0

We are thrilled to introduce Faraday v4.6.0. In this…