April 9, 2024
Enhanced Vulnerability Management Guide Using Open-Source Tools
In the dynamic world of IT security, proactive…
March 12, 2024
Good practices in Cybersecurity – Part 2
Nowadays, we can distinguish various branches within a…
February 15, 2024
Good practices in Cybersecurity – Part 1
Pentesters use a comprehensive and complete toolkit to…
December 7, 2023
First steps in cybersecurity: scan your domain
Pentesters use a comprehensive and complete toolkit to…
November 27, 2023
Visualize findings and get a deeper understanding of your security posture
Our risk scoring system goes beyond mere criticality…
October 26, 2023
Faraday goes to Mind The Sec in São Pablo
Our Ssr. Researcher, Octavio Gianatiempo, presented his…
September 4, 2023
Delivering Client-Ready Reports: Optimizing Penetration Testing Workflow with Zoho and Faraday Integration
Integrating Zoho CRM, Zoho Projects, and Faraday into your…
September 2, 2023
Our COO Martin Tartarelli was in charge of an online workshop on Prioritization
In his own words, Martin stated, “Attempting to address all…