On the 11th April members of the CovertSwarm team took part in an online discussion, hosted by the London CTOs group.
In this session we discuss zero-day vulnerability exploitation and the tactics and techniques used by bad actors, in the wild, today, to exploit businesses around the world.
You can watch the entire discussion below:

The Evolution of EDR Bypasses: A Historical Timeline
The relationship between Endpoint Detection and Response (EDR) solutions and bypass techniques represents one of cybersecurity’s most dynamic battlegrounds. They are a representation of Cybersecurity as…

Billy Giles joins CovertSwarm as Head of Adversary Simulation for North America
CovertSwarm proudly welcomes Billy Giles as Head of Adversary Simulation for the North America region, strengthening our offensive cybersecurity capabilities and constant cyber attack subscription services.…

ANATOMY OF A BREACH: INSIDE THE MODERN RETAIL ATTACK
Retail breaches don’t start with ransomware. They start with people. From social engineering to persistent access, attackers exploit the unseen gaps in your defenses. Learn how…