SCYTHE Goes Atomic

‍ The SCYTHE team is excited to announce that our latest release gives you...

Read More

Modern Authentication Bypasses

Introduction *hacker voice* “I’m in” is a Hollywood-esque phrase you’ve...

Read More

The Purple Team - Organization or Exercise

As the cybersecurity industry continues to evolve, the use of certain...

Read More

SCYTHE: Starting 2019 with Linux and ATT&CK™

The SCYTHE team has been hard at work on our new release and we are proud...

Read More

Fileless Malware and the Threat of Convenience

Many of the conveniences brought via modern tools, operating systems, and...

Read More

The Launch of SCYTHE

When I started GRIMM, I had a vision to tackle the greatest cybersecurity...

Read More

Don’t Get Comfortable Yet - The Declining Fear of Ransomware

With the news that ransomware attacks are on the decline, in favor of...

Read More

What is SCYTHE's origin story?

When I started GRIMM, I had a vision to tackle the greatest cybersecurity...

Read More

A Three-Step Approach to Threats: What All Organizations Should Know (but Equifax Doesn’t)

Within the context of historical cyber breaches, this can be classified as...

Read More