Maturity Models in Vulnerability Management: Where Are You At?

Since organizations differ in size, structure, and…


Expanded Attack Surface: How to Optimize Time and Resources in Cybersecurity

Security teams of all sizes, from large Fortune 500…


Using Faraday API for Vulnerability Management

Within our team, we prefer to focus on specific tasks…


Ten years of cybersecurity, a lifetime of hacking.

Faraday was born from the fusion of entrepreneurial spirit…


Good practices in Cybersecurity – Part 1

Pentesters use a comprehensive and complete toolkit to…


Farewell 2023

But the outcome of all that is so rewarding. It only placed…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…


Release v4.6.0

We are thrilled to introduce Faraday v4.6.0. In this…


Use Slash Command in Slack to interact with Faraday

In this blog, we are going to create a Slack app to allow…