Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Reverse engineering and game hacking resources

Pentesters use a comprehensive and complete toolkit to…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


Continuous testing, continuous security

We have a very diverse team with strengths in different…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly…