Vulnerability Management: A Guide Using Open-Source Tools

In the dynamic world of IT security, proactive…


Good practices in Cybersecurity – Part 1

Pentesters use a comprehensive and complete toolkit to…


Farewell 2023

But the outcome of all that is so rewarding. It only placed…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…


Release v4.6.0

We are thrilled to introduce Faraday v4.6.0. In this…


Use Slash Command in Slack to interact with Faraday

In this blog, we are going to create a Slack app to allow…


A three-hour session about hacking by our CEO, Federico Kirschbaum

It's true that cybersecurity is primarily something…


Cybersecurity in the Blockchain and Web3 by Federico Kirschbaum

Our CEO Federico Kirschbaum participated as a moderator in…


Optimize reporting by integrating Faraday into Zoho.

Integrating Zoho CRM, Zoho Projects, and Faraday into your…