Summiting the Pyramid of Pain: The TTP Pyramid

A Special Thanks The TTP Pyramid expands David Bianco’s Pyramid of Pain. We...

Read More

Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers

A few weeks ago , while watching the Hadza: Last of the First documentary, I...

Read More

Porting the Log4J CVE PoC to SCYTHE

Over the weekend, the infosec community put together many tools for scanning...

Read More

SCYTHE Announces Series A Funding Round

Today, the SCYTHE team and I are thrilled and proud to announce the closure...

Read More

Simplifying the MITRE ATT&CK Framework

INTRODUCTION Before we get into the nitty gritty of things, I’d like to...

Read More

The Risks of Supply Chain Corruption from IoT Devices

The Risks of Supply Chain Corruption from IoT Devices A recent report...

Read More

SCYTHE Partner Spotlight: CIPHER

Cipher Partners With SCYTHE for Adversary Emulation SCYTHE traditionally...

Read More

Blue Team Training, Assumed Breach, and Shifting Security Left

The movement to “shift security left” focuses on mitigating risk as early...

Read More

SCYTHE is thrilled to announce that we have been chosen as a 2021 Timmy Awards Best Tech Startup Finalist!

SCYTHE is officially nominated as a Tech in Motion 2021 Timmy Awards Best Tech...

Read More