Technology

Demystify RFID with insights on components, tag types, modulation, and use cases. A concise guide to the intricate world of RFID.

Uncloaking Radio Frequency Identification (RFID)

Demystify RFID with insights on components, tag types, modulation, and use cases. A concise guide to the intricate world of…

Gaining Initial Access in a Kubernetes Environment (part 2)

Explore initial access in Kubernetes: Uncover application vulnerabilities, compromised images, and cloud credential misuse in Kubernetes environments.

Exploring the Kubernetes Architecture from an Offensive Viewpoint (part 1)

Explore the essentials of Kubernetes: From its Google origins to a key tool in modern cloud-native development, learn about its…

software developer

The trials and tribulations of secure software development

Discover effective strategies for managing third-party libraries, tackling security challenges & handling technical debt in secure software development.

AI voice impersonation: voice-based authentication just got owned

Does the voice you recognize at the end of the phone really belong to the person you think it is?…

Man using laptop

Improving organisational awareness with enhanced Automated Reconnaissance

In the realm of cybersecurity, understanding the vulnerabilities in a system is crucial for any organisation to secure its digital…

will on a rollercoaster

Avoiding the Cyber Risk Rollercoaster

Over 100 global brands subscribe to CovertSwarm's Constant Cyber Attack service to out pace their genuine security threats.

Chatgpt logo

ChatGPT in the wrong hands….

CovertSwarm took a look at how ChatGPT could be subverted and used by a malicious actor to employ AI to…

fallback image

Citrix Gateway and Citrix ADC Security Bulletin for CVE-2022-27510 CVE-2022-27513 and CVE-2022-27516