Homepage
Open in app
Sign in
Get started
Faraday
Faraday Platform helps you perform security engineering by maximizing your team’s resources, increasing risk visibility by converting all your data into valuable information https://www.faradaysec.com/
english
spanish
Follow
Faraday CTF 2022 Write-up: Reverse Engineering and Exploiting an IoT bug.
Faraday CTF 2022 Write-up: Reverse Engineering and Exploiting an IoT bug.
At the beginning of November this year, in Buenos Aires, Argentina, Faraday had the privilege to be a sponsor of the EKOParty security…
Faraday Team
Jan 13
Latest
Prioritizing: making your Vulnerability Management Manageable
Prioritizing: making your Vulnerability Management Manageable
We orchestrate many scanners results at Faraday into the same pipeline. This is how the process starts, but then we devote some time to…
Faraday Team
Jan 13
Exploring the Hidden Attack Surface of OEM IoT devices live talk — English & Spanish
Exploring the Hidden Attack Surface of OEM IoT devices live talk — English & Spanish
Watch our researcher’s live talk in our YouTube channel
Faraday Team
Jan 13
Our team’s vulnerabilities disclosures 2022
Our team’s vulnerabilities disclosures 2022
Our cybersecurity researchers devote time to reporting vulnerabilities in open-source projects we use every day, but our interests are also…
Faraday Team
Jan 13
Latest
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers
When it comes to seeking vulnerabilities, we are professionals at it. It is in our DNA. We have a history of looking for vulns and there…
Faraday Team
Jan 13
AWS Common Issues — Part 2
AWS Common Issues — Part 2
Credentials on EC2 Instances
Faraday Team
Sep 6, 2022
Cybersecurity is a secondary objective, and that’s what we’ve been getting wrong.
Cybersecurity is a secondary objective, and that’s what we’ve been getting wrong.
A programmer is close to a deadline and must work fast. For this one time, they choose to skip certain security protocols. They promise not…
Faraday Team
Jul 26, 2022
Continuous testing, continuous security
Continuous testing, continuous security
A talk with our Red Team lead, Gabriel Franco
Faraday Team
Jul 6, 2022
Top 5 security tips: AWS Cloud Infrastructure
Top 5 security tips: AWS Cloud Infrastructure
Are you trying to improve your security posture on AWS? Read the following recommendations and tips below to avoid these common cloud…
Faraday Team
Jun 16, 2022
On the security of IoT devices
On the security of IoT devices
According to Cisco’s Annual Internet Report, nearly two-thirds of the global population will have Internet access by 2023. The number of…
Octavio Gianatiempo
Jun 2, 2022
Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router
Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router
We started out by trying to connect to the router via UART and found out that it asks for a username and password in order to log in. We…
Octavio Galland
Jun 1, 2022
About Faraday
Latest Stories
Archive
About Medium
Terms
Privacy