SCYTHE 5.1 Released  Read More

How One PowerShell Command Give's Attackers Complete Control

PowerShell is one of the most powerful tools in the Windows ecosystem. It’s...

Read More

Threat Thursday: Emulating Nested Campaigns

In a recent Threat Thursday Live session, the team at SCYTHE delved into a...

Read More

Why You Needs Continuous Security Controls Validation

The cyber threat landscape in 2025 is more unpredictable than ever. According...

Read More

Why SCYTHE’s Agent Model is More Efficient than Legacy BAS

For Continuous Threat Exposure Management (CTEM) and Breach and Attack...

Read More

Is a TTX in Your Future?

Whether you're the U.S. Army, the New England Patriots, or the security...

Read More

The Future of Proactive Cybersecurity: Key Trends to Watch in 2025

In today’s cybersecurity landscape, standing still is not an option. Threat...

Read More

The 20/80 Rule in Tool Utilization

In my decade-long tenure as a CISO within the Defense Industrial Base (DIB),...

Read More

Purple Teaming for Operational Technology (OT)

This joke highlights key differences between Information Technology (IT) and...

Read More

Why Cyber Risks Persist for Companies, Even with In-House Teams or MSSP Support

As cyber threats become more sophisticated, organizations are increasingly...

Read More