Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


Authentication Bypass/Instance Takeover Vulnerability via Zabbix Frontend – CVE-2022-23131

Critical RCE Vulnerabilities in WordPress Plugin PHP Everywhere

Privilege Escalation Vulnerability in Windows Print Spooler – CVE-2022-22718

Critical Vulnerability Alert in Samba – CVE-2021-44142

Demonstration of remote root via Log4Shell and PwnKit attack chain
CovertSwarm demonstrating a full remote 'root' attack chain - enabled by Log4Shell (CVE-2021-44228) + PwnKit (CVE-2021-4034) Over the past months…

Critical 0-day vulnerability in Polkit pkexec component

CovertSwarm appoints Luke Potter as Chief Operating Officer
CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger ‘Constant Cyber Attack’ service offering…

What is an Application-level Attack?
Application-level attacks are those attacks that exploit weaknesses with a program itself rather than its underlying infrastructure.

What is Fingerprinting in Ethical Hacking?
Fingerprinting (also known as footprinting) is the process of enumerating a target online presence, often the first step when planning…