Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Man sitting at a desk with laptop in a high rise building

What is a False Positive in Cyber Security?

A false positive within cyber security refers to an alert or vulnerability that has been incorrectly flagged, usually caused by…

Man typing on laptop

Internal vs External Pen Testing

The aim of the pen test is to identify weaknesses and flaws within the infrastructure’s attack surface and leverage them…

Close up of a man in glasses with reflection of binary

What is Nmap in Cyber Security?

Nmap is a port scanning tool used by penetration testers and hackers to identify exposed services.

Computer screen graphic

What is an OSCP Penetration Test?

An OSCP Penetration Test or OSCP Pentest typically means that a Penetration Test is carried out by someone who has…

Mastercard

What is PCI Pen Testing?

Payment Card Industry (PCI) Penetration Testing or more commonly shortened to PCI Pen Testing is running penetration tests for the…

CREST logo with star accreditation

CovertSwarm Gains Further Accreditation with CREST STAR

CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger ‘Constant Cyber Attack’ service. Today,…

Crest certification logo

CovertSwarm Achieves CREST Accreditation

CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger Constant Cyber Attack service. Today,…

fallback image

An introduction to Constant Cyber Attack

A lit up computer screen

Improving Internal Cybersecurity Engagement – Q&A

CovertSwarm is a modern and growing cyber security business that defends an increasing number of global organisations.