Enhanced Vulnerability Management Guide Using Open-Source Tools

In the dynamic world of IT security, proactive…


Good practices in Cybersecurity – Part 2

Nowadays, we can distinguish various branches within a…


Good practices in Cybersecurity – Part 1

Pentesters use a comprehensive and complete toolkit to…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and get a deeper understanding of your security posture

Our risk scoring system goes beyond mere criticality…


Faraday at Ekoparty 2023

Cybersecurity is a large group of people working to make…


Faraday goes to Mind The Sec in São Pablo

Our Ssr. Researcher, Octavio Gianatiempo, presented his…


Our COO Martin Tartarelli was in charge of an online workshop on Prioritization

In his own words, Martin stated, “Attempting to address all…


Las Vegas 2023 recap

Another Las Vegas season has passed, and it's been a……