Sitemap - 2024 - Covert Access Team
Chinese Hackers Breach U.S. Treasury Systems
Private Security Turns On Ship
From Break-In to Breakthrough: Securing Your Client’s Facility After a Penetration Test
One of The Biggest Mistakes In Pentesting
Advantech ICS Wi-Fi Access Points Vulnerabilities
Testing Commonly Suggested Thermal Bypassing Items
Salt Typhoon Breach On U.S. Telecom Networks
Interview with John-André Bjørkhaug
Fighting the Machines: Turning Security Camera's Against Themselves
Chinese Ship Identified in Two European Undersea Cable Destruction
Raytheon Gets Fined For Over A Decade Of Bribery & Corruptions Charges
Interview With Travis Weathers
Developing Recon Tips & Tricks
From Trust to Treachery: The F-35 Espionage Story and Its Global Impact
A Return to Asymmetric Warfare And A New Threat
Breaching Buildings With Origami
How a Tiny Paper Crane Opened the Door to a High-Security Lab
Technique For Bypassing Every Alarm ... Except One
Knowing Your Area’s Crime Trends Is Critical to Security
When Clients Say There Is No Point
It’s dangerous to go alone… take this
Reading the Room: The Power of Empathy in Social Engineering
Report Blueprint: How to Turn Sneaky Tactics into Actionable Findings
Developing The Attacker's Mindset
A Look At China's Talent Programs
How Cryptex and UAPS Became Central in Russia's Largest Cybercrime Sting
How Long Should an Engagement Last?
Quarkslab Takes Down MIFARE Classic
Covert Access Team Discord Channel
Water Theft and Sabotage: Exploring Vulnerabilities in the Water System
Can Any Glass Stop Burglars? Understanding Security Glass Ratings
Spotting Fake Faces: How to Detect AI Masking in Video Calls
Follow-up: Hezbollah Pager Explosions Escalate as Hand-held Devices Detonate Across Lebanon
Perhaps The Most Extensive Physical Supply Chain Attacks In History
The Cost of Convenience: How Navy Officer's Carelessness Led to a Major Security Breach
From Metcalf to Today: The Growing Need for Power Grid Physical Security
The Most Important Skills To Be On A Black Team
Venezuelan Gangs in the U.S: Takeovers of U.S. Apartment Buildings
Forced Entry: A Look At Door Strength
When Security Gets Embarrassing: Mickey Mouse Breaches Andrews Air Force Base
Chinese Espionage Scandal Hits New York
How To Think Asymmetrically - Role playing As A Threat Actor
Addressing The Physical Security Flaws In Hospitals
From Gold Stars to Red Flags: The Physical Security Gap in PCI Compliance
Building Intel: Long-Range Recon Techniques
Pegasystems, Insider Threats & 2 Billion Dollars
Key Casting Product Comparison
A Closer Look at the Case of Gohkan Gun
U.S. Military Analyst Admits to Conspiracy and Illegal Export of Sensitive Data
The Crucial Role of Police in Physical Security: A London Perspective
Always Listen To The Guy On The Ground
Meet the Black Team: The Specialists Behind Successful Security Breaches
France’s Critical Infrastructure Under Siege
Training for Cohesion: How Team Dynamics Improve Penetration Testing
The Power of Confidence in Social Engineering
How A North Korean Spy Infiltrated A US Tech Company
Who Holds The Keys To Your Kingdom
Discussing The Rising Trend of ATM Bombings
The Slow and Steady Approach to Embedded Recon
Pentagon Leaks and Beyond: Insider Threat Case Studies
What Every Client Needs to Know About Physical Pentesting
When Trust is Broken: High-Profile Recent Insider Espionage Cases in the U.S. Military
Sandworm Attacks: Analyzing the 2015 Ukrainian Power Grid Event
The Role of Alarm Flooding in Cyber-Physical Security: Lessons from the BP Refinery Incident
Critical Water Systems at Risk: Addressing the 70% Security Vulnerability
Foreign Nationals Increasingly Target U.S. Navy Bases
Unlocking Secrets: A Step-by-Step Guide for Practicing Elicitation
The Rising Tide of Construction Equipment Theft in the UK
From Within: Tackling Insider Threats (Part 2)
Understanding the Elbit Systems Security Breach: A Physical Security Perspective
From Within: Tackling Insider Threats (Part 1)
How to Get into Black Teaming and Physical Penetration Testing
Mastering the Art of Rapid Rapport: Tips for Instant Connection
The Most Cost Effective Security Improvement - The CAT Method
Discount For Upcoming Physical Auditing Class
Mapping the Path: A Black Team's Guide to Route Selection
From Construction to Crime: How Industrial Equipment is Fueling Urban Theft
A New Tool To Steal Credentials
AI and Data Privacy: Balancing Innovation with Security
Choosing the Right Security Evaluation: Audit or Pentest
The Alarming Rise of AI Cloning in Cyber Frauds
Counter Elicitation: Identifying Elicitation Attempts
Continuing To Bypass Wireless Cameras
Saflok Hotel Locks Vulnerable to Master Key Attack
A Primer on Deciphering Concealed Emotions
Eyes Everywhere: Turning Security Cameras into Pentesting Assets
Securing The Home - Navigating Security Cameras
Asymmetric Warfare: An Evolving Threat To Critical Infrastructure
Going Kinetic: The Pros and Cons of Bumping
Eliciting Information: The Paradox of the Grumpy Guy
Snap, Drill, Bypass: Exposing Yet Another Euro Cylinder Lock Flaw
Yet Another Surveillance Camera Vulnerability
How to Fortify Your Home's First Line of Defense: The Door
Elicitation Toolbox Course Feb 22-23
The Watchers: Enhancing Team Operations in Surveillance
Maximizing Reach: Combining Wifi & Physical
Cozy Bear Infiltrates Hewlett Packard Enterprise
From Strangers to Insiders: The Overlooked Key to Successful Physical Pentests
Seeds of Insecurity: How 'Mellon' Cracks Open OSDP
RFID Sleight of Hand: Covert Cloning Techniques
Cisco Unity Connection Critical Vulnerability
The Role of Erik van Sabben in the Sabotage of Iran's Nuclear Program