Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


DEF CON 30: what it is and where to find us
When it comes to your cyber security, you have to keep ahead of the curve.

What’s it like to work at CovertSwarm?

Exploiting Microsoft Windows 11 via Process No-Hollowing
An adapted technique to bypass Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) solutions.

Working at CovertSwarm: One Hive Member’s Experience
Jack Smith is a Cyber Security Consultant and Red Team Hive Member and one of our newest additions to the…

Continuous offensive security – How does it all work?

The Tiber EU Framework: What is it and why is it important?

Zero-day vulnerability in Atlassian Confluence

The Internet of Things: Securing the Hidden Attack Surface of Your Home

Zero-day vulnerability in Microsoft Office – Follina