Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

cross site scripting

What is Cross-Site Scripting (XSS) and how do you prevent it?

Read our guide to find out what Cross Site Scripting (XSS) is, how it works, why it’s dangerous and how…

A close-up of a person's hand resting on a computer mouse, with black nail polish visible on their fingernails.

Multi-Factor Authentication (MFA): what you need to know

Read our blog to find out what Multi-Factor Authentication (MFA) is, why it’s vital to have it and how AI…

man in the middle attack

What is a Man-in-the-Middle (MitM) attack?

Read our blog to find out what Man in the Middle (MitM) attacks are, why they’re dangerous and how to…

brute force attack

What are brute force attacks?

Read our blog to find out what brute force attacks are, how they work, why they’re dangerous and how to…

The image displays a close-up view of a black badge with the "CovertSwarm" logo

We’re joining the Badge Life Movement: Discover the CovertSwarm Badge at DEF CON 31

Will the CovertSwarm Badge will be joining your Badge Life collection at DEF CON 31?

Covertswarm secures investment from beech tree private equity

Beech Tree Private Equity announces an investment in CovertSwarm, a leading red team-as-a-service and cyber-attack simulation platform.

eavesdropping

What is an eavesdropping attack?

Read our guide to find out about what eavesdropping attacks are, why they exist, their objectives and how to prevent…

dns

What is DNS and how does it work?

Read our guide to find out what DNS is, how it works, what attacks they can be prone to and…

smishing

What is smishing and how do you prevent it?

Read our guide to find out what smishing is, different types, why it’s a problem for organizations and how to…