Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Everyone has a plan until they get punched in the face: reflections on the NCSC 2025 annual review

The NCSC Annual Review 2025 delivers a reality check. Highly significant cyber incidents have increased by 50 percent year over…

aerial view of a city symbolising complexity and continuous threat readiness

Part 3: CBEST Series – The Future of Threat-Led Penetration Testing

Regulated testing like CBEST is pivotal, but as threats shift, organizations must adopt more strategic, agile threat-led penetration testing. Discover…

Shopping cart left on a wet city street at night, symbolising online shopping risks during Prime Day

Prime Day Scams – How Attackers Exploit Trust and Urgency

Every Prime Day, fake delivery texts flood inboxes, exploiting shoppers’ urgency and trust. We explain how these scams work and…

Dimly lit computer in a dark room, evoking hidden threats and reduced visibility.

Why So Syscalls? BOF Edition

Ibai Castells explains how moving from high level Windows APIs to lower level syscall usage alters what EDRs observe. It…

Passengers waiting in an airport terminal during global check-in disruption caused by ransomware attack

Airport Chaos Shows How Fragile Our Infrastructure Really Is

Recent airport chaos revealed how fragile global infrastructure really is. A basic ransomware attack disrupted shared systems, grounding flights worldwide.…

Executives in a boardroom looking out of tall windows toward the horizon, symbolising strategic vision and offensive security leadership.

Offensive Security Is No Longer Optional

Gartner’s 2025 research validates what we’ve long believed: to stay ahead of attackers, organizations must embrace continuous, proactive offensive security.

Abstract image of a shadowy crowd, symbolizing how red team OSINT reveals hidden human vulnerabilities

Inside a Red Team OSINT Operation: Mapping the Human Attack Surface 

Most organizations focus on infrastructure. Red teams target people. We explore how OSINT is used to map the human attack…

Screenshot of Atlas AI plugin running in Burp Suite, showing local LLM-based request analysis without cloud data transfer

Atlas AI: Local LLM inside Burp Suite

Atlas AI adds LLM-powered analysis to Burp Suite without sending data to the cloud. Built for offensive security teams who…

Abstract representation of cybersecurity strategy and business growth

Redefining Cybersecurity Value: A CFO’s Take on ROI and Resilience 

Cybersecurity is how modern businesses grow with confidence. But only if that investment is tested, validated, and aligned to what…