10 Benefits of Red Team Engagements

10 Benefits of Red Team Engagements We have all heard that, “practice makes...

Read More

Red Team and Threat-Led Penetration Testing Frameworks

Leveraging frameworks and methodologies for offensive security assessments...

Read More

SCYTHE Welcomes Megan Samford to Advisory Council

As SCYTHE looks boldly ahead into the new year, the Unicorns welcome the...

Read More

No Rest for the Weary: Breaches are Inevitable

In the past week, we learned that both FireEye and SolarWinds were breached....

Read More

Attack Infrastructure: Red Teams vs. Malicious Actors

Setting up Attack Infrastructure is an important task performed by Red...

Read More

Episode 3: Leveraging Resources When Chock Full of Challenges with Guest Mitch Parker

‍ Episode 2 Show Notes‍ Healthcare is chock full of adventure - rising...

Read More

Active Directory Attacks with Kerberoasting

Kerberoasting is a method to steal encrypted Kerberos tickets from valid...

Read More

CISO Stressed Episode 2: Digital Empathy in the Customer Experience (Guest Shawn M Bowen)

Episode 2 Show Notes‍ Building security in the customer experience,...

Read More

SCYTHE Updates: Purple Team Programming

Meeting today's security challenges requires the Red Team and the Blue Team...

Read More