Covert Access Team
Subscribe
Sign in
Home
Podcast
Archive
About
What Is Inside Room 641A
What if someone could intercept your emails, web browsing, and communications not by hacking your devices or breaking your encryption—but by walking…
4 mins ago
•
Brian Harris
Share this post
Covert Access Team
What Is Inside Room 641A
Copy link
Facebook
Email
Notes
More
Latest
Top
Discussions
Operating Alone
Today we are discussing what it takes to run an engagement solo.
Jun 9
•
Brian Harris
1
Share this post
Covert Access Team
Operating Alone
Copy link
Facebook
Email
Notes
More
51:39
Interview With Patrick Laverty
Today I am chatting with Patrick Laverty who is a seasoned professional specializing in social engineering and penetration testing.
Jun 3
•
Brian Harris
Share this post
Covert Access Team
Interview With Patrick Laverty
Copy link
Facebook
Email
Notes
More
1:36:50
Weaponized Policy: A Case Study in Security Oversight
What happens when a policy designed to protect public health becomes a ticking time bomb for public safety?
Jun 2
•
Brian Harris
1
Share this post
Covert Access Team
Weaponized Policy: A Case Study in Security Oversight
Copy link
Facebook
Email
Notes
More
Know Thyself (and Thy Team)
How often do you think about your actual capabilities—not what you hope you're good at, but what you can reliably perform under pressure, in the field…
Jun 1
•
Brian Harris
2
Share this post
Covert Access Team
Know Thyself (and Thy Team)
Copy link
Facebook
Email
Notes
More
The Pillars of Security
Today we are chatting about the pillars of security, what they are and what common mistakes organizations make when implementing them
May 26
•
Brian Harris
Share this post
Covert Access Team
The Pillars of Security
Copy link
Facebook
Email
Notes
More
1:00:07
China's Hidden Backdoors in the West’s Renewable Energy Systems
What if your rooftop solar panels could be used as a weapon—not by you, but by a foreign adversary thousands of miles away?
May 25
•
Brian Harris
2
Share this post
Covert Access Team
China's Hidden Backdoors in the West’s Renewable Energy Systems
Copy link
Facebook
Email
Notes
More
1
The Chameleon is Back
The reappearance of the Chameleon device line, in the form of the Chameleon Ultra, brings back a familiar name.
May 16
•
Brian Harris
1
Share this post
Covert Access Team
The Chameleon is Back
Copy link
Facebook
Email
Notes
More
See all
Covert Access Team
Cyber & Physical Security, Penetration Testing, Social Engineering
Subscribe
Become a Black Team Member
Covert Access Training Course
5 Day Hands On Black Team Training
Elicitation Toolbox Course
2 Day Course on Elicitation & Social Engineering
Cyber Bootcamp for Black Teams
2 Day Course Learning Cyber Skills for Black Team Members
Covert Access Team
Subscribe
About
Archive
Recommendations
Sitemap
Share this publication
covertaccessteam
Covert Access Team
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts