Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Football stadium breach

Dynamic Attack Surfaces: The Professional Sports Problem

Professional sports organizations face cybersecurity challenges that don't fit traditional frameworks. With seasonal spikes, constant third-party integrations, and workforce volatility,…

City surveillance at night

Claude Jailbroken To Attack Mexican Government Agencies

A threat actor jailbroke Claude to orchestrate a month-long attack on Mexican government networks, stealing 150 GB of sensitive data.…

Jayson E Street joins CovertSwarm

Jayson E Street Joins CovertSwarm

The man who accidentally robbed the wrong bank in Beirut is now part of the Swarm. Jayson E Street joins…

iNTERCEPT - See the invisible

iNTERCEPT – How A Small RF Experiment Turned Into A Community SIGINT Platform

I've always been fascinated by RF. There's something about the fact that it's invisible, the fact that you might be…

Silhouette of person in dark environment representing insider threat in agentic IDE security with code and terminal windows in background

When Your IDE Becomes An Insider: Testing Agentic Dev Tools Against Indirect Prompt Injection

Agentic development tools don't need to bypass your firewall. They're already inside. And if an attacker can control what they…

Modern office building at night showing AI agent security risks with autonomous systems running in corporate networks

What Moltbook reveals about AI agent security

The Moltbook launch exposed a critical gap: organizations deploying AI agents faster than they can secure them. Research shows 22%…

Dark underground stairway representing hidden SaaS security vulnerabilities and cloud dependencies

Cloud security vulnerabilities: the unpatchable risks hiding in your SaaS stack 

The cloud gives businesses scalability, agility, and built-in resilience. But it’s created a dangerous illusion: that moving workloads to SaaS…

Dark office environment showing interconnected multi-agent AI systems network visualization

Inject one agent, own them all: The cascading risk of multi-agent AI

Ninety percent of organizations are deploying AI agents. Most aren't monitoring what they do. Multi-agent systems amplify this blindspot: one…

Silhouettes of a team standing together in low light, representing collaboration within a Security Operations Center.

SOC Testing: Turning Your Security Operations Centre into a Continuous Learning Engine

SOC testing isn’t just about finding vulnerabilities. It’s about building collaboration, sharpening human judgment, and turning your SOC into a…