We focus on cutting edge offensive cyber security techniques that go far beyond standard scanning to uncover vulnerabilities that others miss. We are not a conventional security firm.
A deeper overview.
We focus on cutting-edge offensive cyber security techniques that go far beyond standard scanning to uncover vulnerabilities that others miss. We are not a conventional security firm.
Pioneers in Vulnerability Management
Founded in 2004 by researchers Faraday leveraged all their research and consulting expertise into a platform that promotes collaboration among security experts.
Community-driven and proud of it
Founding members of Ekoparty security conferences, the largest cybersecurity conference in Latin America. Our specialists are speakers at the most respected security research conferences such as Defcon, BlackHat, Shakacon and H2HC among others.
In-house Research Lab
A team of experts solely dedicated to researching cryptography, forensics, electronics development and reverse engineering.
Mobile Application SecurityYour Applications can suffer a cyber-attack just like your Networks. We analyze your mobile architecture giving you a comprehensive map of vulnerable areas to remediate.
Penetration TestingUsing the same techniques an adversary would use, we recreate a real attack environment to conquer the most vulnerable assets and areas of your infrastructure..
Application Vulnerability AnalysisYour apps are the most common gateways for security weaknesses. We use a comprehensive suite of technical solutions to perform a professional assessment that guarantees a real map of vulnerable vectors.
Network Security AssessmentThe health of your networks compromises the health of your company. Our technical Red Team performs an exhaustive analysis detecting areas of critical risk.
Code ReviewVulnerabilities are identified directly in your code, reviewing the software quality assurance. *We classify* them by risk, with advice on the best way to mitigate the general impact on your organization.
Reverse EngineeringAuthentic Red Team in action. The art of deconstructing to rebuild the original equation. A reverse ride allows you to extract sources of real cyber threats for your most valuable applications.
Physical Security AssessmentHardware and Software Security is not complete without closeness. An offensive art focused on detecting potential failures reviewing your on-site infrastructure.
Client-Side AttacksInternal customers are one of the most vulnerable attack vectors in your company. By working with an authorized intrusion attempt, you can verify the right workstation set up and the awareness level to enhance security policies.
Vulnerability Security Program
Development and support of Security Programs to obtain industry certifications like General Data Protection Regulation (GDPR), the Federal Information Security Management Act (FISMA), Sarbanes-Oxley (SOX), HIPAA, ISO 27001, Payment Card Industry Data Security Standard (PCI DSS) and more.
IoT Security Testing Services
The Internet of Things (IoT) Industry is rapidly growing in popularity. We provide support to address issues from design and implementation to validation of your products.
Startup Security Process
Startups have a high growth value in terms of business, but security sometimes isn't a priority. We designed a program to partner with small and large companies that are looking to outsource or build Security capabilities.
We work with companies that look for that extra mile, those who understand the importance of security and are looking for a deeper overview of their security posture to ensure that no rock is left unturned.