Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Exploring the Hidden Attack Surface of OEM IoT devices talk

The security of a company’s network also depends on the…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Bypassing passwords and getting a shell through UART in a Wi-Fi router

We started out by trying to connect to the router via UART…


Our team’s vulnerabilities disclosures 2022

We devote time to reporting vulnerabilities in open-source…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Password strength

Passwords are the first aspect of computer security we…