We are hiring globally! Join our team.

[email protected]     +44 (0) 330 330 5156

iconfinder_Circled_Twitter_svg_5279123_edited.png
iconfinder_Circled_Linkedin_svg_5279114_edited.png
youtube-icon-4.png
CS_FullLogo_W.png
Request Cyber Assistance
Book a demo
Navigation
  • All Posts
  • Glossary
  • News
  • Blog
  • Podcast
Search
What is Session Hijacking?
CovertSwarm
  • Nov 3, 2021
  • 2 min

What is Session Hijacking?

Session hijacking is an attack that consists of exploiting the web applications users' session control in order to impersonate other...
Retail Penetration Test
CovertSwarm
  • Nov 3, 2021
  • 1 min

Retail Penetration Test

What types of penetration testing do retail stores need? The types of penetration testing that retail stores need will directly be linked...
Malicious Code
CovertSwarm
  • Nov 3, 2021
  • 1 min

Malicious Code

What is malicious code and what can it do? Malicious code usually performs actions against the user’s interest. This might be for example...
CEH Certification
CovertSwarm
  • Nov 3, 2021
  • 1 min

CEH Certification

What are the prerequisites for doing CEH certification CEH or Certified Ethical Hacker (EC-Council) has a recommended requirement of two...
What is a Session Fixation Attack?
CovertSwarm
  • Oct 22, 2021
  • 2 min

What is a Session Fixation Attack?

Session Fixation is an attack that allows a malicious actor to hijack a valid user session by forcing that user to use a fixed session ID.
What is Penetration Testing Software?
CovertSwarm
  • Oct 22, 2021
  • 1 min

What is Penetration Testing Software?

Penetration testing software is the toolset of penetration testers. Learn more.
What is a Network Penetration Test?
CovertSwarm
  • Oct 22, 2021
  • 1 min

What is a Network Penetration Test?

Network penetration tests are used to identify security weaknesses within the networks (both internal networks and external networks)....
What is a Computer Worm?
CovertSwarm
  • Oct 22, 2021
  • 2 min

What is a Computer Worm?

A computer worm is a type of malware that propagates itself across a network by replication itself from host to host independently. They...
What is Enumeration in Cyber Security?
CovertSwarm
  • Oct 22, 2021
  • 1 min

What is Enumeration in Cyber Security?

Cyber security enumeration is a process used by both security professionals and attackers alike to establish a collective knowledge of...
What is Vishing?
CovertSwarm
  • Oct 11, 2021
  • 5 min

What is Vishing?

‘Vishing’ is a social engineering attack vector that uses the telephone (phone) network as a method to target potential victims. Learn more.
Red Teaming vs Penetration Testing
CovertSwarm
  • Oct 8, 2021
  • 8 min

Red Teaming vs Penetration Testing

Red Teaming and Penetration Testing are useful practices for organizations looking to improve their security. Learn more.
Can You Pentest AWS?
CovertSwarm
  • Sep 24, 2021
  • 1 min

Can You Pentest AWS?

Unless you are working directly with AWS then you will not be able to run a pentest against the AWS cloud environment directly. You are...
What is an SQL Injection Attack?
CovertSwarm
  • Sep 24, 2021
  • 1 min

What is an SQL Injection Attack?

SQL (Structured Query Language) injection is an attack that exploits an insecure coding weakness within an application that interacts...
What is Broken Authentication?
CovertSwarm
  • Sep 24, 2021
  • 1 min

What is Broken Authentication?

Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or application.
Is Linux Good for Ethical Hacking?
CovertSwarm
  • Sep 24, 2021
  • 2 min

Is Linux Good for Ethical Hacking?

Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors...
Is Open Source or Proprietary More Secure?
CovertSwarm
  • Sep 24, 2021
  • 1 min

Is Open Source or Proprietary More Secure?

Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security...
What is the Information Security CIA?
CovertSwarm
  • Sep 24, 2021
  • 1 min

What is the Information Security CIA?

The CIA triad is a security model of three core principles used within IT security and Information Security policies within an organisation.
What is a Purple Team Assessment?
CovertSwarm
  • Sep 22, 2021
  • 1 min

What is a Purple Team Assessment?

Unlike the red team engagements, the purple-team testing is a collaborative exercise between both the red team and the blue team. Learn more
What is a Red Team Assessment?
CovertSwarm
  • Sep 22, 2021
  • 1 min

What is a Red Team Assessment?

A red-team assessment is a simulated attack against an organisation using real-world information and threat intelligence analysis...
What is a Physical Penetration Test?
CovertSwarm
  • Sep 22, 2021
  • 2 min

What is a Physical Penetration Test?

A physical penetration test is where an ethical hacker or social engineer will try to gain entry to one of your locations. Learn more.
1
2
3
CS_LogoOnly_White.png

CovertSwarm Limited

International House

Holborn Viaduct

Holborn

London

EC1A 2BN

0330 330 5156

©2022 CovertSwarm Limited

cyberessentials_certification mark_colour .png
37838_Crest icons_2022_4_PT + STAR PT-.png
Our Solution

Penetration Testing

Red Team

Ethical Hacking

About Us

Contact Us

Careers

Sitemap

Privacy Policy