Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Professional headshot of Louis Blackburn, CovertSwarm’s Operations Director. He is portrayed in a formal, business-oriented portrait, reflecting his leadership role in managing operations for the cybersecurity company.

Louis Blackburn joins as Operations Director

Louis joins CovertSwarm from Lloyds Banking Group with an extensive background in red teaming, becoming the latest senior hire as…

CovertBrew Invitation - Blog (2)

CovertBrew February Edition

Our first ever CovertBrew networking event.

Banner image for a blog post on discovering and addressing WordPress vulnerabilities to enhance website security. The graphic includes visual elements that represent cybersecurity and the WordPress platform, underscoring the theme of safeguarding websites.

Discovering WordPress Vulnerabilities to Make it Safer

Breeze - WordPress Cache Plugin

cyber attacks

Exploiting CVE-2023-5044 and CVE-2023-5043 to overtake a Kubernetes Cluster

In this blog we are exploring two new CVE's that exploit an issue in the NGINX controller when NGINX is…

A close-up of an RFID card being scanned by a reader, illustrating secure access technology.

Uncloaking Radio Frequency Identification (RFID)

Demystify RFID with insights on components, tag types, modulation, and use cases. A concise guide to the intricate world of…

People working in a modern office setting, seen through a glass wall, creating a sense of collaboration and focus.

A journey into Badge Life

Explore CovertSwarm's Badge Life journey from Defcon 30 chaos to Defcon 31 triumphs. Join the hardware hacking adventure in this…

A person working on a laptop in a dark room, representing cyber threats or hacking.

Gaining Initial Access in a Kubernetes Environment (part 2)

Explore initial access in Kubernetes: Uncover application vulnerabilities, compromised images, and cloud credential misuse in Kubernetes environments.

A close-up of a keyboard with hands typing, symbolizing cybersecurity or digital work.

Exploring the Kubernetes Architecture from an Offensive Viewpoint (part 1)

Explore the essentials of Kubernetes: From its Google origins to a key tool in modern cloud-native development, learn about its…

Golden ticket attack

Persistence Attack in Active Directory: The Golden Ticket Attack

Delve into the Golden Ticket Attack in Active Directory: a key APT method. Discover its workings, countermeasures, and detection to…