Faraday TeaminFaradayUsing Faraday API for Vulnerability ManagementAs in any consulting process, we often find that performing repetitive tasks consumes time that we could invest in other activities. At…Jul 23Jul 23
Faraday TeaminFaradayFaraday goes to Defcon: “Taking off the blindfold: Detecting persistent threats on Draytek edge…Faraday goes to #DEFCON 🔥Jul 16Jul 16
Faraday TeaminFaradayExpanding Attack Surface: How to Optimize Time and Resources in CybersecuritySecurity teams of all sizes, from large Fortune 500 companies to small NGOs, face the same problem: a lack of time and an ever-expanding…Jul 11Jul 11
Faraday TeaminFaradayGood practices in Cybersecurity: Red Team, Blue Team, Purple Teams and more! — Part 2Different approaches, one common goal: what kind of hacker do I need?Mar 13Mar 13
Faraday TeaminFaradayGood practices in Cybersecurity — Part 1Good practices in cybersecurity, which have a long-lasting positive impact, need to be ingrained in daily routines and considered a…Feb 26Feb 26
Faraday TeaminFaradaySADProtocol goes to HollywoodThis research project started when Javier’s wife, our ex Research leader, told him their IP camera had stopped working. Javier was asked to…Feb 26Feb 26