SCYTHE 5.1 Released  Read More

 

Resources

Threat Intel & Resources

"Built for the people doing the work, not for marketing."

Weekly threat analysis from our red team. A campaign library mapped to MITRE ATT&CK. Live and on-demand video. Practitioner guides for security leaders building mature offensive programs. Everything here is free.

Overview

What you'll find

 

Threat Thursday

Weekly breakdowns of real adversary techniques, how they work, how to emulate them, and how to validate whether your defenses catch them.

 

SCYTHE Labs & Blogs Library

In-depth threat actor profiles, adversarial emulation analyses, and technical research. Named actors. Real TTPs. MITRE ATT&CK mapped.

 

Watch

Live and recorded sessions from Threat Thursday Live and Unicorn Dispatch Live, practitioner discussions, threat walkthroughs, and platform demos on YouTube.

 

Downloads

Frameworks, guides, and research reports for practitioners and security leaders. Free, no form-fills for most resources.

Watch

Live & On-Demand

Practitioner-led sessions from the SCYTHE team — threat walkthroughs, adversary emulation demos, and red/blue team discussions. Subscribe to catch new episodes live.

 

Weekly

Threat Thursday Live

Trey & Tyler | SCYTHE Labs

Join SCYTHE's red team every Thursday for live adversary technique breakdowns, MITRE ATT&CK walkthroughs, and emulation demos.

Watch Playlist
 

Series

Unicorn Dispatch Live

Hosted by Bryson Bort, SCYTHE Founder & CEO

Longer-form conversations with security practitioners, threat researchers, and platform experts on adversarial emulation strategy and defensive operations.

Watch Playlist
Subscribe on YouTube

THREAT INTEL

Threat Thursday Content & Resources

 
August 26, 2025

Threat Thursday: Lateral Movement with Living Off the Land Techniques

Lateral movement remains one of the most critical (and often most frustrating) components of red team campaigns. During this recent "Threat Thursday…

July 16, 2025

Threat Thursday: Emulating Nested Campaigns in SCYTHE

In a recent Threat Thursday Live session, the team at SCYTHE delved into a recurring question from users and workshop attendees:How do you emulate…

December 12, 2024

Threat Thursday: 2024 in Review

The cybersecurity landscape continues to evolve, with threat actors targeting critical infrastructure, government entities, and industries worldwide.…

SCYTHE LABS & BLOGS

Threat Intel, Articles, and Opinions

 
March 20, 2026

MuddyWater Displaying New Tactics and Intriguing Malware

How MuddyWater Leveled Up Its Game.

March 12, 2026

APT28 — BadPaw / MeowMeow: From Manual Lab to Continuous Emulation

A technical analysis of the APT28 BadPaw/MeowMeow campaign, showing how manual lab simulation and SCYTHE adversarial emulation can be used to…

February 05, 2026

SCYTHE and Starseer Partner to Secure Enterprises Against AI-Driven Attacks

Joint solution brings together advanced adversary emulation and AI assurance to defend enterprises against AI-enabled threats

SCYTHE DOWNLOADABLES

eBooks, eBuides, and more.

 

A Guide to Adversarial Emulation & Validation (AEV)

Your organization should undergo regular security posture assessments which serve as your annual cybersecurity physical, providing insights into your organization.

Cyber Fitness Guide

Your organization should undergo regular security posture assessments which serve as your annual cybersecurity physical, providing insights into your organization.

Offensive Cybersecurity Maturity

For security leaders looking to navigate this challenging landscape, developing a comprehensive, forward-looking strategy is essential.

Cybersecurity Fitness Guide

This annual cyber fitness guide is designed to help you baseline your cyber risk, validate cyber hygiene, assess your cyber readiness.

Red Team Operations Roadmap

This eBook serves as a comprehensive roadmap for organizations at any stage of their Red Team maturity.

Adversarial Behavior Detection

The threat landscape continues to evolve, driving continuous transformation across all industries, IT and OT/ICS professions, and regulations.

CISOs Guide to Purple Teaming

The SCYTHE Purple Team Exercise Framework (PTEF) provides a structured path for organizations to build...

Contact Us

Welcome to SCYTHE, your partner in understanding and defending against cyber attacks. We appreciate your interest in enhancing your cybersecurity defenses.

Please fill the form to reach out to our dedicated team.