Tag:cyber attack

Retail breaches don’t start with ransomware. They start with people. From social engineering to persistent access, attackers exploit the unseen gaps in your defenses. Learn how modern retail attacks unfold.

Retail breach

Anatomy of a Breach: Inside the Modern Retail Attack

Retail breaches don’t start with ransomware. They start with people. From social engineering to persistent access, attackers exploit the unseen…

Banner image for a blog post on discovering and addressing WordPress vulnerabilities to enhance website security. The graphic includes visual elements that represent cybersecurity and the WordPress platform, underscoring the theme of safeguarding websites.

Discovering WordPress Vulnerabilities to Make it Safer

Breeze - WordPress Cache Plugin

cyber attacks

Exploiting CVE-2023-5044 and CVE-2023-5043 to overtake a Kubernetes Cluster

In this blog we are exploring two new CVE's that exploit an issue in the NGINX controller when NGINX is…

Golden ticket attack

Persistence Attack in Active Directory: The Golden Ticket Attack

Delve into the Golden Ticket Attack in Active Directory: a key APT method. Discover its workings, countermeasures, and detection to…

Graphic illustrating CovertSwarm's Employee Net Promoter Score (eNPS) results, showcasing employee satisfaction metrics and engagement insights. The design highlights feedback themes and scores, reflecting the company’s focus on a positive workplace culture.

Our first Employee Net Promoter Score in review

CovertSwarm ranked as one of the leading industry employers after recording our first ‘excellent’ score

Scaled-down banner for CovertSwarm's feature in the Startups 100 Index, showcasing branding that emphasizes company achievements.

CovertSwarm named on the Startups 100 Index

Startup.co.uk has recognized us as one of the UK’s leading start-ups and part of the next generation of game changers.

insider threat

What are insider threats and how do you prevent them?

Read our guide to understand what you need to know about insider threats, why they’re dangerous & how to identify,…

red team penetration testing

What’s the difference between red teaming and penetration testing?

Read our blog to find out the differences between red teaming & penetration testing & how to choose the right…

red team blue team

What’s the difference between a red team and a blue team?

Read our blog to find out what the differences are between a red & a blue team & what their…