Resources

Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.

People talking at desk

The podcast

Insights, interviews and tales from inside the Cybersecurity industry

Start listening

spear phishing

What is spear phishing and how do you prevent it?

Read our guide to find out what spear phishing is, why it’s a problem for organizations and how to prevent…

Two men stand in front of a building entrance adorned with lush greenery and flowers. Both are casually dressed, one in a light blue striped shirt and the other in a gray polo.

CovertSwarm revolutionizes Attack Surface Management with launch of free Offensive Operations Center

Our new platform is the missing link that joins SaaS-identified vulnerabilities and the ability to validate risk through a seamless…

supply chain attack

Why red team exercises should be included in your company’s supply chain defense strategy

Supply chain attacks are a threat to companies and end users. Read this blog to find out why red teams…

sheffield

SteelCon 2023: diary of a conference goon

Earlier this month, one of our Swarm members volunteered at one of the most prestigious hacker conferences in the UK,…

sql injection attack

What is a SQL injection (SQLi) attack and how can you prevent them?

SQL injection is a complex world, but it’s important for organizations to understand the impact and preventative measures. Read our…

malware

What is malware and how can you prevent it?

Read our guide to find out what malware is, why it exists, different types and how to prevent it to…

phishing attack

What is phishing and how can you prevent it?

Read our complete guide to learn what phishing is, different types of attack, how it works and how to prevent…

A close-up shot of a person holding an iPhone to their ear, indicating a phone conversation. The person has dark, polished nails and wears a large, sparkling diamond ring on their ring finger.

AI voice impersonation: voice-based authentication just got owned

Does the voice you recognize at the end of the phone really belong to the person you think it is?…

A logo on a dark background featuring a stylized 'R' and 'T' in a circuit-like design, colored in shades of red and purple.

CovertSwarm Hive member, Dario Tejada, shares knowledge to Spanish cybersecurity community

Late last month, one of CovertSwarm’s Hive members presented at the cybersecurity community, RedTeamRD, located in the Dominican Republic.