Why assume breach?

TL;DR: Are you wondering why you and your organization should assume...

Read More

The Difference Between Cybersecurity Simulation vs Cybersecurity Emulation

In a world where threat actors continuously evolve their cyber attack...

Read More

Backdoors and Breaches Expansion Deck

TL;DR: Looking for a new and interactive way to prepare your security team?...

Read More

CISO Stressed Episode 4: SCYTHE Chief of Staff Elizabeth Wharton interviews Dr. Pablo Breuer.

On this episode of CISO STRESSED, SCYTHE Chief of Staff Elizabeth...

Read More

Loading Capabilities from Memory: Open Sourcing SCYTHE's Windows C In-memory Module Loader

This is Jonathan Lim and Ateeq Sharfuddin, and in this blog we share a...

Read More

Vulnerability Management is Hard! Using CVSS and other scoring to prioritize patching

I spent 10 years learning and building a robust vulnerability management...

Read More

SCYTHE Named 2021 TAG Cyber Distinguished Vendor

SCYTHE is proud to be an industry leader in breach and attack prevention,...

Read More

Using SCYTHE payload as Shellcode

Using SCYTHE payload as Shellcode Guest blog post by one of our ...

Read More

UniCon21 Recap

Fireside Chat: 1-10-60 Detection Metrics with Dmitri Alperovitch and Bryson Bort

Read More