CISO Stressed Episode 4: SCYTHE Chief of Staff Elizabeth Wharton interviews Dr. Pablo Breuer.

On this episode of CISO STRESSED, SCYTHE Chief of Staff Elizabeth...

Read More

Loading Capabilities from Memory: Open Sourcing SCYTHE's Windows C In-memory Module Loader

This is Jonathan Lim and Ateeq Sharfuddin, and in this blog we share a...

Read More

Vulnerability Management is Hard! Using CVSS and other scoring to prioritize patching

I spent 10 years learning and building a robust vulnerability management...

Read More

SCYTHE Named 2021 TAG Cyber Distinguished Vendor

SCYTHE is proud to be an industry leader in breach and attack prevention,...

Read More

Using SCYTHE payload as Shellcode

Using SCYTHE payload as Shellcode Guest blog post by one of our ...

Read More

UniCon21 Recap

Fireside Chat: 1-10-60 Detection Metrics with Dmitri Alperovitch and Bryson Bort

Read More

Adversary Emulation Metrics Time to Detect

Offensive security professionals and program coordinators have a learning...

Read More

Setting up SCYTHE-VECTR integration

Many SCYTHE customers like to track their red and purple team exercises in...

Read More

Defense Evasion with SCYTHE

“Do you have any tips and tricks to avoiding Anti Virus (AV) and Endpoint...

Read More