News
When it comes to your cyber security, you have to keep ahead of the curve.
DEF CON 30: what it is and where to find us
When it comes to your cyber security, you have to keep ahead of the curve.
What’s it like to work at CovertSwarm?
Exploiting Microsoft Windows 11 via Process No-Hollowing
An adapted technique to bypass Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) solutions.
Working at CovertSwarm: One Hive Member’s Experience
Jack Smith is a Cyber Security Consultant and Red Team Hive Member and one of our newest additions to the…
CONSTANT offensive security – How does it all work?
The Tiber EU Framework: What is it and why is it important?
Zero-day vulnerability in Atlassian Confluence
The Internet of Things: Securing the Hidden Attack Surface of Your Home
Zero-day vulnerability in Microsoft Office – Follina