Covert Access Team
Subscribe
Sign in
Home
Podcast
Archive
About
Latest
Top
Discussions
The Operator’s Phonebook: How To Record
I have decided to make a series all about ways, tips and tricks that black teams can, and in my opinion should, use their cell phones when on…
17 hrs ago
•
Brian Harris
1
Share this post
Covert Access Team
The Operator’s Phonebook: How To Record
Copy link
Facebook
Email
Notes
More
Critical Hikvision Flaw Exposes Entire Camera Networks to Remote Takeover
In mid-2025, security researchers uncovered a critical vulnerability in Hikvision's HikCentral Professional software—identified as CVE‑2025‑34067—that…
Jul 10
•
Brian Harris
1
Share this post
Covert Access Team
Critical Hikvision Flaw Exposes Entire Camera Networks to Remote Takeover
Copy link
Facebook
Email
Notes
More
1
When Are You Finished
Its a simple question, but when you are running an audit, pentest or hybrid, how do you know when the test is over
Jul 7
•
Brian Harris
Share this post
Covert Access Team
When Are You Finished
Copy link
Facebook
Email
Notes
More
54:13
Vulnerabilities in ZKTeco Biometric Terminals
How safe is your fingerprint or face scan? What if someone could replicate your biometric data with a fake QR code, or access your identity just by…
Jul 3
•
Brian Harris
5
Share this post
Covert Access Team
Vulnerabilities in ZKTeco Biometric Terminals
Copy link
Facebook
Email
Notes
More
1
June 2025
The RAF Brize Norton Breach: What Low-Tech Sabotage Says About UK Security
The Palestine Action group are at it again.
Jun 27
•
Brian Harris
2
Share this post
Covert Access Team
The RAF Brize Norton Breach: What Low-Tech Sabotage Says About UK Security
Copy link
Facebook
Email
Notes
More
1
Interview With Kev Milne
Today we are talking to Kev Milne, who is one of the rare mainframe penetration testers.
Jun 25
•
Brian Harris
Share this post
Covert Access Team
Interview With Kev Milne
Copy link
Facebook
Email
Notes
More
53:17
The Truck Next Door: How Covert Vehicles Are Becoming the Frontline of Modern War
What if the next missile strike on your infrastructure didn’t come from the sky or over the horizon—but from inside your own borders?
Jun 17
•
Brian Harris
1
Share this post
Covert Access Team
The Truck Next Door: How Covert Vehicles Are Becoming the Frontline of Modern War
Copy link
Facebook
Email
Notes
More
2
What Is Inside Room 641A
What if someone could intercept your emails, web browsing, and communications not by hacking your devices or breaking your encryption—but by walking…
Jun 12
•
Brian Harris
3
Share this post
Covert Access Team
What Is Inside Room 641A
Copy link
Facebook
Email
Notes
More
1
Operating Alone
Today we are discussing what it takes to run an engagement solo.
Jun 9
•
Brian Harris
3
Share this post
Covert Access Team
Operating Alone
Copy link
Facebook
Email
Notes
More
51:39
Interview With Patrick Laverty
Today I am chatting with Patrick Laverty who is a seasoned professional specializing in social engineering and penetration testing.
Jun 3
•
Brian Harris
Share this post
Covert Access Team
Interview With Patrick Laverty
Copy link
Facebook
Email
Notes
More
1:36:50
Weaponized Policy: A Case Study in Security Oversight
What happens when a policy designed to protect public health becomes a ticking time bomb for public safety?
Jun 2
•
Brian Harris
1
Share this post
Covert Access Team
Weaponized Policy: A Case Study in Security Oversight
Copy link
Facebook
Email
Notes
More
Know Thyself (and Thy Team)
How often do you think about your actual capabilities—not what you hope you're good at, but what you can reliably perform under pressure, in the field…
Jun 1
•
Brian Harris
2
Share this post
Covert Access Team
Know Thyself (and Thy Team)
Copy link
Facebook
Email
Notes
More
1
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts