Release v4.3.3

We are excited to announce the release of our latest…


Security Orchestration, the key to Vulnerability Management

Whether your IT department or security team needs to…


2022 Recap: our most read article

A new year means new opportunities but also new…


Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Exploring the Hidden Attack Surface of OEM IoT devices live talk – English & Spanish

The security of a company’s network also depends on the…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router

We started out by trying to connect to the router via UART…


Our team’s vulnerabilities disclosures 2022

We devote time to reporting vulnerabilities in open-source…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…