Technology
Discover effective strategies for managing third-party libraries, tackling security challenges & handling technical debt in secure software development.

The trials and tribulations of secure software development
Discover effective strategies for managing third-party libraries, tackling security challenges & handling technical debt in secure software development.

AI voice impersonation: voice-based authentication just got owned
Does the voice you recognize at the end of the phone really belong to the person you think it is?…

Improving organisational awareness with enhanced Automated Reconnaissance
In the realm of cybersecurity, understanding the vulnerabilities in a system is crucial for any organisation to secure its digital…

Avoiding the Cyber Risk Rollercoaster
Over 100 global brands subscribe to CovertSwarm's Constant Cyber Attack service to out pace their genuine security threats.

ChatGPT in the wrong hands….
CovertSwarm took a look at how ChatGPT could be subverted and used by a malicious actor to employ AI to…

Citrix Gateway and Citrix ADC Security Bulletin for CVE-2022-27510 CVE-2022-27513 and CVE-2022-27516

Discovering and identifying change to your organisation’s attack surface
The Offensive Operations Centre is a gateway to understanding the exposure of your organisation and the risks that may present…

CovertSwarm: How our technology helps you
At CovertSwarm our mission is to constantly compromise our customers.