On the 11th April members of the CovertSwarm team took part in an online discussion, hosted by the London CTOs group.
In this session we discuss zero-day vulnerability exploitation and the tactics and techniques used by bad actors, in the wild, today, to exploit businesses around the world.
You can watch the entire discussion below:

What is Breach and Attack Simulation (BAS)?
Read our guide to find out what Breach and Attack Simulation (BAS) is, how it works, why and how it’s important, and some best practices.

Best red team tools for your cybersecurity strategy
Read our blog to find out the best red team tools to use for your cybersecurity strategy, how to choose and use them.

What is vulnerability scanning and why is it important?
Read our comprehensive guide on vulnerability scanning, including what it is, why it’s important, how it works & best practices for organizations.