News

Traditional ‘snapshot’ penetration testing cannot keep pace with modern rates of business and technology change. It is underpinned by an ethos that “point in time” testing is enough. And this is no longer true.

fallback image

Pentesting is DEAD.

Traditional ‘snapshot’ penetration testing cannot keep pace with modern rates of business and technology change. It is underpinned by an…

Phone screen with instagram logo

CovertSwarm collaborates with BBC on Instagram Scam investigation

CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger ‘Constant Cyber Attack’ service. Today,…

Rotary phone in black and white background

CovertSwarm assists BBC with telephone ‘number spoofing’ investigation

CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger ‘Constant Cyber Attack’ service. Today,…

Man at desk working on laptop

The Challenges of ethical hacking

Learn more about the different challenges presented within ethical hacking.

Woman working on laptop

How to Become a Cyber Security Consultant

In this post, we'll discuss common questions on how to become a consultant within cyber security.

fallback image

How Secure are TPM Chips?

This article demonstrates that the security of BitLocker for full disk encryption - when deployed in conjunction with Trusted Platform…

CREST logo with star accreditation

CovertSwarm Gains Further Accreditation with CREST STAR

CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger ‘Constant Cyber Attack’ service. Today,…

Crest certification logo

CovertSwarm Achieves CREST Accreditation

CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger Constant Cyber Attack service. Today,…

fallback image

An introduction to Constant Cyber Attack