Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Dimly lit computer in a dark room, evoking hidden threats and reduced visibility.

Why So Syscalls? BOF Edition

Ibai Castells explains how moving from high level Windows APIs to lower level syscall usage alters what EDRs observe. It…

Passengers waiting in an airport terminal during global check-in disruption caused by ransomware attack

Airport Chaos Shows How Fragile Our Infrastructure Really Is

Recent airport chaos revealed how fragile global infrastructure really is. A basic ransomware attack disrupted shared systems, grounding flights worldwide.…

Executives in a boardroom looking out of tall windows toward the horizon, symbolising strategic vision and offensive security leadership.

Offensive Security Is No Longer Optional

Gartner’s 2025 research validates what we’ve long believed: to stay ahead of attackers, organizations must embrace continuous, proactive offensive security.

Abstract image of a shadowy crowd, symbolizing how red team OSINT reveals hidden human vulnerabilities

Inside a Red Team OSINT Operation: Mapping the Human Attack Surface 

Most organizations focus on infrastructure. Red teams target people. We explore how OSINT is used to map the human attack…

Screenshot of Atlas AI plugin running in Burp Suite, showing local LLM-based request analysis without cloud data transfer

Atlas AI: Local LLM inside Burp Suite

Atlas AI adds LLM-powered analysis to Burp Suite without sending data to the cloud. Built for offensive security teams who…

Abstract representation of cybersecurity strategy and business growth

Redefining Cybersecurity Value: A CFO’s Take on ROI and Resilience 

Cybersecurity is how modern businesses grow with confidence. But only if that investment is tested, validated, and aligned to what…

Dark urban alleyway , symbolizing hidden threats and unseen digital activity.

AI: The Great Equalizer in Cyber Offense

AI has erased the barrier between elite hackers and everyone else. From ransomware to large-scale extortion, attackers are now using…

Classic vs Passthrough path to choose

Cobalt Strike External C2 Passthrough Guide

Cobalt Strike’s passthrough mode reshapes how red teams use External C2. By taking control of shellcode staging and custom channels,…

Looking up at a glass skyscraper framed between concrete overpasses, symbolising layered perspectives and security vantage points in CBEST threat intelligence

Part 2: CBEST Series – Operational Resilience

CBEST threat-led testing proves whether your organization can withstand real-world attacks, uncovering hidden weaknesses and driving true operational resilience.