Adversary Emulation Metrics Time to Detect

Offensive security professionals and program coordinators have a learning...

Read More

Setting up SCYTHE-VECTR integration

Many SCYTHE customers like to track their red and purple team exercises in...

Read More

Defense Evasion with SCYTHE

“Do you have any tips and tricks to avoiding Anti Virus (AV) and Endpoint...

Read More

SCYTHE v3.2 is Available!

SCYTHE v3.2 is Available! We are excited to announce the release of SCYTHE...

Read More

How to Defend Against Ransomware

‍ Chris Krebs, former CISA Director At the RSA Conference in 2020, I...

Read More

The continuing pain of PowerShell

Microsoft PowerShell has long been used by system administrators, and in...

Read More

Our Founder and CEO Bryson Bort breaks down the Florida water treatment facility attack.

Our Founder and CEO Bryson Bort breaks down the Florida water treatment...

Read More

Introduction to Adversary Emulation

What is adversary emulation? Adversary emulation leverages adversary...

Read More

Red Team Non-Attributable Infrastructure and the Executive Order

The January 19, 2021 Executive Order on Taking Additional Steps to Address...

Read More