News
An adapted technique to bypass Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) solutions.

Exploiting Microsoft Windows 11 via Process No-Hollowing
An adapted technique to bypass Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) solutions.

Working at CovertSwarm: One Hive Member’s Experience
Jack Smith is a Cyber Security Consultant and Red Team Hive Member and one of our newest additions to the…

Continuous offensive security – How does it all work?

The Tiber EU Framework: What is it and why is it important?

Zero-day vulnerability in Atlassian Confluence

The Internet of Things: Securing the Hidden Attack Surface of Your Home

Zero-day vulnerability in Microsoft Office – Follina

Diary of a Cyber Attacker
When you think of an attacker, it’s tempting to imagine a Matrix-style hacker in a hoodie. In reality, these bad…

CovertSwarm Inc. launched in North America
CovertSwarm has modernized the cyber security industry through its ‘Constant Cyber Attack’ subscription service and Offensive Operations Center attack platform.…