SCYTHE 5.1 Released  Read More
Posts about

blog

10 Benefits of Red Team Engagements

Blog Red Teaming Controls Validation Purple Teaming You bought the tools....

Read More

Key Takeaways from UniCon 2025 – Fall Edition

UniCon 2025 – Fall Edition which took place on September 17, 2025 brought...

Read More

Lateral Movement with Living Off the Land Techniques

Lateral movement remains one of the most critical (and often most frustrating)...

Read More

How One PowerShell Command Give's Attackers Complete Control

PowerShell is one of the most powerful tools in the Windows ecosystem. It’s...

Read More

Threat Thursday: Emulating Nested Campaigns

In a recent Threat Thursday Live session, the team at SCYTHE delved into a...

Read More

Why SCYTHE’s Agent Model is More Efficient than Legacy BAS

For Continuous Threat Exposure Management (CTEM) and Breach and Attack...

Read More

Purple Teaming for Operational Technology (OT)

This joke highlights key differences between Information Technology (IT) and...

Read More

TSA SD-02C: Critical Infrastructure Cyber Regulations

In response to escalating cybersecurity threats targeting the United State's...

Read More

Command-Line Obfuscation | SCYTHE

Read More