Security Orchestration, the key to Vulnerability Management

Whether your IT department or security team needs to…


2022 Recap: our most read article

A new year means new opportunities but also new…


Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Exploring the Hidden Attack Surface of OEM IoT devices live talk – English & Spanish

The security of a company’s network also depends on the…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router

We started out by trying to connect to the router via UART…


Our team’s vulnerabilities disclosures 2022

We devote time to reporting vulnerabilities in open-source…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…