Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


CovertSwarm assists BBC with telephone ‘number spoofing’ investigation
CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger ‘Constant Cyber Attack’ service. Today,…

The Challenges of ethical hacking
Learn more about the different challenges presented within ethical hacking.

How to Become a Cyber Security Consultant
In this post, we'll discuss common questions on how to become a consultant within cyber security.

Can You Pentest AWS?
Unless you are working directly with AWS then you will not be able to run a pentest against the AWS…

What is Broken Authentication?
Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or…

What is the Information Security CIA?
The CIA triad is a security model of three core principles used within IT security and Information Security policies within…

Is Linux Good for Ethical Hacking?
Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors.

Is Open Source or Proprietary More Secure?
Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and…

What is a Physical Penetration Test?
A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…