Automating Security Tasks

In this second part (part one), we will show a step by step…


2022 Recap: our most read article

A new year means new opportunities but also new…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity…


Our CEO Federico Kirschbaum at Argentina Fintech Forum

“Security is a culture; you set it up, learn from it, and…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


Cybersecurity is a secondary objective

A rapidly growing business must choose where to locate its…


Continuous testing, continuous security

Cybersecurity as a constant race, in which attackers and…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly…


Privacy Preference Center