SCYTHE 5.1 Released  Read More

 

Resources

Threat Intel & Resources

"Built for the people doing the work, not for marketing."

Weekly threat analysis from our red team. A campaign library mapped to MITRE ATT&CK. Live and on-demand video. Practitioner guides for security leaders building mature offensive programs. Everything here is free.

Overview

What you'll find

 

Threat Thursday

Weekly breakdowns of real adversary techniques, how they work, how to emulate them, and how to validate whether your defenses catch them.

 

SCYTHE Labs & Blogs Library

In-depth threat actor profiles, adversarial emulation analyses, and technical research. Named actors. Real TTPs. MITRE ATT&CK mapped.

 

Watch

Live and recorded sessions from Threat Thursday Live and Unicorn Dispatch Live, practitioner discussions, threat walkthroughs, and platform demos on YouTube.

 

Downloads

Frameworks, guides, and research reports for practitioners and security leaders. Free, no form-fills for most resources.

Watch

Live & On-Demand

Practitioner-led sessions from the SCYTHE team — threat walkthroughs, adversary emulation demos, and red/blue team discussions. Subscribe to catch new episodes live.

 

Weekly

Threat Thursday Live

Trey & Tyler | SCYTHE Labs

Join SCYTHE's red team every Thursday for live adversary technique breakdowns, MITRE ATT&CK walkthroughs, and emulation demos.

Watch Playlist
 

Series

Unicorn Dispatch Live

Hosted by Bryson Bort, SCYTHE Founder & CEO

Longer-form conversations with security practitioners, threat researchers, and platform experts on adversarial emulation strategy and defensive operations.

Watch Playlist
Subscribe on YouTube

Threat News

Labs, Threat Thursday & More

Category Blog Opinion Research News Video
Type Threat Intelligence Malware Analysis Red Teaming Detection Engineering Controls Validation Purple Teaming CTEM OT / ICS Platform & Product AI & Automation

Research Threat Intelligence Malware Analysis
When Trusted Updates Turn Malicious: The Notepad++ Supply Chain Attack Apr 24, 2026
Research Threat Intelligence Malware Analysis Red Teaming
JScript Dropper: From Malware Analysis to Continuous Emulation Apr 24, 2026
News Purple Teaming
Purple Team Exercise Framework V4 Apr 17, 2026
Opinion Controls Validation AI & Automation
But The AI Said Everything Is Fine? Mar 27, 2026
Research Malware Analysis Threat Intelligence
MuddyWater Displaying New Tactics and Intriguing Malware Mar 20, 2026
Research Red Teaming Threat Intelligence
APT28 — BadPaw / MeowMeow: From Manual Lab to Continuous Emulation Mar 12, 2026
Research Threat Intelligence
SCYTHE Labs Threat Intel: Scattered Spider (UNC3944) Sep 10, 2025
No resources match your filters. Try a different combination.

SCYTHE Blogs

Articles, News, and Opinions

Category Blog Opinion Research News Whitepaper Video
Type Threat Intelligence Red Teaming Detection Engineering Controls Validation Purple Teaming CTEM OT / ICS Platform & Product Leadership & Strategy AI & Automation Compliance & Frameworks

Opinion Controls Validation Platform & Product
Why Legacy BAS Vendors Fall Short in AEV Apr 17, 2026
Opinion Red Teaming Controls Validation
Cybersecurity Testing Evolves: Pen Testing, BAS, BAS+, & AEV Apr 17, 2026
Blog Red Teaming Controls Validation
Why Assume Breach? Apr 17, 2026
Blog Red Teaming Controls Validation
The Difference Between Cybersecurity Simulation vs Cybersecurity Emulation Apr 17, 2026
Blog Controls Validation Platform & Product
Best Breach and Attack Simulation (BAS) & AEV Tools 2026 Apr 17, 2026
Blog Red Teaming Detection Engineering
Defense Evasion with SCYTHE Dec 29, 2023
News Platform & Product
SCYTHE Announces Series A Funding Round Nov 8, 2021
News Platform & Product
The Launch of SCYTHE Oct 17, 2018
No resources match your filters. Try a different combination.

SCYTHE DOWNLOADABLES

eBooks, eBuides, and more.

 

A Guide to Adversarial Emulation & Validation (AEV)

Your organization should undergo regular security posture assessments which serve as your annual cybersecurity physical, providing insights into your organization.

Cyber Fitness Guide

Your organization should undergo regular security posture assessments which serve as your annual cybersecurity physical, providing insights into your organization.

Offensive Cybersecurity Maturity

For security leaders looking to navigate this challenging landscape, developing a comprehensive, forward-looking strategy is essential.

Cybersecurity Fitness Guide

This annual cyber fitness guide is designed to help you baseline your cyber risk, validate cyber hygiene, assess your cyber readiness.

Red Team Operations Roadmap

This eBook serves as a comprehensive roadmap for organizations at any stage of their Red Team maturity.

Adversarial Behavior Detection

The threat landscape continues to evolve, driving continuous transformation across all industries, IT and OT/ICS professions, and regulations.

CISOs Guide to Purple Teaming

The SCYTHE Purple Team Exercise Framework (PTEF) provides a structured path for organizations to build...

Contact Us

Welcome to SCYTHE, your partner in understanding and defending against cyber attacks. We appreciate your interest in enhancing your cybersecurity defenses.

Please fill the form to reach out to our dedicated team.