Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


DEF CON 30: what we learned (and how it helps you)
In August, the CovertSwarm team attended DEF CON 30 in Las Vegas – the cyber industry’s premier hacker convention, and…

Working at CovertSwarm: Our First Intern

Critical RCE in DrayTek Routers (CVE-2022-32548)

Why a cyber value proposition should be part of your business strategy
Whatever your industry, it’s critical to think about your cyber security posture in the right way.

Critical vulnerabilities identified in VMware products (CVE-2022-31656)

DEF CON 30: what it is and where to find us
When it comes to your cyber security, you have to keep ahead of the curve.

What’s it like to work at CovertSwarm?

Exploiting Microsoft Windows 11 via Process No-Hollowing
An adapted technique to bypass Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) solutions.

Working at CovertSwarm: One Hive Member’s Experience
Jack Smith is a Cyber Security Consultant and Red Team Hive Member and one of our newest additions to the…