Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

Rotary phone in black and white background

CovertSwarm assists BBC with telephone ‘number spoofing’ investigation

CovertSwarm is modernising the penetration testing, red teaming, and bug bounty industries with its challenger ‘Constant Cyber Attack’ service. Today,…

Man at desk working on laptop

The Challenges of ethical hacking

Learn more about the different challenges presented within ethical hacking.

Woman working on laptop

How to Become a Cyber Security Consultant

In this post, we'll discuss common questions on how to become a consultant within cyber security.

a wall with AWS logo

Can You Pentest AWS?

Unless you are working directly with AWS then you will not be able to run a pentest against the AWS…

Broken iphone screen

What is Broken Authentication?

Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or…

Woman against a graphic background

What is the Information Security CIA?

The CIA triad is a security model of three core principles used within IT security and Information Security policies within…

Keyboard

Is Linux Good for Ethical Hacking?

Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors.

Laptop screen with code

Is Open Source or Proprietary More Secure?

Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and…

Person pressing a floor button in a lift

What is a Physical Penetration Test?

A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…