Attack Infrastructure: Red Teams vs. Malicious Actors

Setting up Attack Infrastructure is an important task performed by Red...

Read More

Episode 3: Leveraging Resources When Chock Full of Challenges with Guest Mitch Parker

‍ Episode 2 Show Notes‍ Healthcare is chock full of adventure - rising...

Read More

Active Directory Attacks with Kerberoasting

Kerberoasting is a method to steal encrypted Kerberos tickets from valid...

Read More

CISO Stressed Episode 2: Digital Empathy in the Customer Experience (Guest Shawn M Bowen)

Episode 2 Show Notes‍ Building security in the customer experience,...

Read More

SCYTHE Updates: Purple Team Programming

Meeting today's security challenges requires the Red Team and the Blue Team...

Read More

CISO Stressed Episode 1: Wendy Nather & Tyrone Wilson

Episode 1 Show Notes Conversations stimulate ideas, solutions, and...

Read More

FAQs - Getting Started in Ethical Hacking

“How do I get started in ethical hacking, penetration testing, or red...

Read More

Defend Our Healthcare

Hackers are targeting hospitals with increasingly sophisticated ransomware...

Read More

UniCon CTF - Know Your Payload

On August 20, 2020 we ran our first SCYTHE User Conference, UniCon, our very...

Read More