Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


Critical RCE in DrayTek Routers (CVE-2022-32548)

Why a cyber value proposition should be part of your business strategy
Whatever your industry, it’s critical to think about your cyber security posture in the right way.

Critical vulnerabilities identified in VMware products (CVE-2022-31656)

DEF CON 30: what it is and where to find us
When it comes to your cyber security, you have to keep ahead of the curve.

What’s it like to work at CovertSwarm?

Exploiting Microsoft Windows 11 via Process No-Hollowing
An adapted technique to bypass Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) solutions.

Working at CovertSwarm: One Hive Member’s Experience
Jack Smith is a Cyber Security Consultant and Red Team Hive Member and one of our newest additions to the…

Continuous offensive security – How does it all work?

The Tiber EU Framework: What is it and why is it important?