Sitemap - 2024 - Covert Access Team

Chinese Hackers Breach U.S. Treasury Systems

Lets Talk Bugs

A Tale Of Two Routes

Hacking The Trust Equation

Private Security Turns On Ship

From Break-In to Breakthrough: Securing Your Client’s Facility After a Penetration Test

One of The Biggest Mistakes In Pentesting

The Guan Tianfeng Case

Advantech ICS Wi-Fi Access Points Vulnerabilities

Testing Commonly Suggested Thermal Bypassing Items

A Return To Escape Clauses

Salt Typhoon Breach On U.S. Telecom Networks

Discussing Asymmetric Attacks

Interview with John-André Bjørkhaug

Fighting the Machines: Turning Security Camera's Against Themselves

Chinese Ship Identified in Two European Undersea Cable Destruction

Raytheon Gets Fined For Over A Decade Of Bribery & Corruptions Charges

Interview With Travis Weathers

A Return To Keyboxes

Lessons Learned From Red Cell

How To Make The Pentest Sale

The Cloak Of Invisibility

Developing Recon Tips & Tricks

From Trust to Treachery: The F-35 Espionage Story and Its Global Impact

RFID Cloning & Equipment

Interview With Nima Statius

A Return to Asymmetric Warfare And A New Threat

Breaching Buildings With Origami

How a Tiny Paper Crane Opened the Door to a High-Security Lab

Interviewing Olie Brown

Technique For Bypassing Every Alarm ... Except One

Knowing Your Area’s Crime Trends Is Critical to Security

When Clients Say There Is No Point

It’s dangerous to go alone… take this

Reading the Room: The Power of Empathy in Social Engineering

Report Blueprint: How to Turn Sneaky Tactics into Actionable Findings

Developing The Attacker's Mindset

A Look At China's Talent Programs

How Cryptex and UAPS Became Central in Russia's Largest Cybercrime Sting

How Long Should an Engagement Last?

Quarkslab Takes Down MIFARE Classic

Covert Access Team Discord Channel

Water Theft and Sabotage: Exploring Vulnerabilities in the Water System

Can Any Glass Stop Burglars? Understanding Security Glass Ratings

Tools Used For AI Masking

Spotting Fake Faces: How to Detect AI Masking in Video Calls

Auditing vs. Physical Penetration Testing: Which Physical Security Strategy is Right for Your Business?

Follow-up: Hezbollah Pager Explosions Escalate as Hand-held Devices Detonate Across Lebanon

Perhaps The Most Extensive Physical Supply Chain Attacks In History

The Cost of Convenience: How Navy Officer's Carelessness Led to a Major Security Breach

From Metcalf to Today: The Growing Need for Power Grid Physical Security

The Most Important Skills To Be On A Black Team

Venezuelan Gangs in the U.S: Takeovers of U.S. Apartment Buildings

Forced Entry: A Look At Door Strength

When Security Gets Embarrassing: Mickey Mouse Breaches Andrews Air Force Base

Chinese Espionage Scandal Hits New York

How To Think Asymmetrically - Role playing As A Threat Actor

Addressing The Physical Security Flaws In Hospitals

From Gold Stars to Red Flags: The Physical Security Gap in PCI Compliance

Building Intel: Long-Range Recon Techniques

Pegasystems, Insider Threats & 2 Billion Dollars

Key Casting Product Comparison

A Closer Look at the Case of Gohkan Gun

U.S. Military Analyst Admits to Conspiracy and Illegal Export of Sensitive Data

The Crucial Role of Police in Physical Security: A London Perspective

Always Listen To The Guy On The Ground

Meet the Black Team: The Specialists Behind Successful Security Breaches

France’s Critical Infrastructure Under Siege

Training for Cohesion: How Team Dynamics Improve Penetration Testing

The Power of Confidence in Social Engineering

How A North Korean Spy Infiltrated A US Tech Company

Who Holds The Keys To Your Kingdom

Discussing The Rising Trend of ATM Bombings

The Slow and Steady Approach to Embedded Recon

Pentagon Leaks and Beyond: Insider Threat Case Studies

What Every Client Needs to Know About Physical Pentesting

When Trust is Broken: High-Profile Recent Insider Espionage Cases in the U.S. Military

Sandworm Attacks: Analyzing the 2015 Ukrainian Power Grid Event

The Role of Alarm Flooding in Cyber-Physical Security: Lessons from the BP Refinery Incident

Critical Water Systems at Risk: Addressing the 70% Security Vulnerability

Foreign Nationals Increasingly Target U.S. Navy Bases

Multiple Finnish Water Treatment Centers Broken Into & Fake Doctor Attempts To Breach Multiple Health Centers

Unlocking Secrets: A Step-by-Step Guide for Practicing Elicitation

The Rising Tide of Construction Equipment Theft in the UK

From Within: Tackling Insider Threats (Part 2)

Understanding the Elbit Systems Security Breach: A Physical Security Perspective

From Within: Tackling Insider Threats (Part 1)

How to Get into Black Teaming and Physical Penetration Testing

Mastering the Art of Rapid Rapport: Tips for Instant Connection

The Most Cost Effective Security Improvement - The CAT Method

Covert Access Training Week

Discount For Upcoming Physical Auditing Class

Mapping the Path: A Black Team's Guide to Route Selection

From Construction to Crime: How Industrial Equipment is Fueling Urban Theft

A New Tool To Steal Credentials

AI and Data Privacy: Balancing Innovation with Security

Choosing the Right Security Evaluation: Audit or Pentest

The Alarming Rise of AI Cloning in Cyber Frauds

Counter Elicitation: Identifying Elicitation Attempts

Continuing To Bypass Wireless Cameras

Saflok Hotel Locks Vulnerable to Master Key Attack

A Primer on Deciphering Concealed Emotions

Eyes Everywhere: Turning Security Cameras into Pentesting Assets

Securing The Home - Navigating Security Cameras

Asymmetric Warfare: An Evolving Threat To Critical Infrastructure

Going Kinetic: The Pros and Cons of Bumping

Eliciting Information: The Paradox of the Grumpy Guy

Snap, Drill, Bypass: Exposing Yet Another Euro Cylinder Lock Flaw

Yet Another Surveillance Camera Vulnerability

How to Fortify Your Home's First Line of Defense: The Door

Elicitation Toolbox Course Feb 22-23

The Watchers: Enhancing Team Operations in Surveillance

Maximizing Reach: Combining Wifi & Physical

Cozy Bear Infiltrates Hewlett Packard Enterprise

From Strangers to Insiders: The Overlooked Key to Successful Physical Pentests

Seeds of Insecurity: How 'Mellon' Cracks Open OSDP

RFID Sleight of Hand: Covert Cloning Techniques

Cisco Unity Connection Critical Vulnerability

The Role of Erik van Sabben in the Sabotage of Iran's Nuclear Program