-

SCYTHE Unveils Version 4.3: Revolutionizing Threat Emulation and Exposure Management

MIAMI--(BUSINESS WIRE)--SCYTHE, the pioneer in advanced adversarial emulation and comprehensive cybersecurity risk management, is proud to announce the release of SCYTHE 4.3. This latest version brings a host of powerful enhancements designed to support and advance cybersecurity teams' capabilities in threat emulation, vulnerability management, and security integration.

SCYTHE 4.3 New Features Summary
SCYTHE 4.3 introduces several groundbreaking features, reaffirming our commitment to providing cutting-edge tools for cybersecurity professionals:

Assessment Module for PTEs: This release significantly enhances our Purple Team Exercise (PTE) assessment module, providing advanced functionalities that dramatically improve purple teaming effectiveness. The new features include automated data capture and comprehensive reporting, streamlining the assessment process and ensuring detailed and actionable recommendations.

Attack Flow Designer: The new Attack Flow designer offers a visual interface for designing and visualizing SCYTHE threat campaigns. This feature meets the demands of teams looking for a more intuitive way to visualize and develop threat campaigns, enabling them to create and manage threats through a user-friendly visual palette.

EDR and SIEM Integrations: SCYTHE 4.3 includes several new integrations with Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) systems, enhancing the platform's versatility and utility:

  • EDR: Crowdstrike, SentinelOne, and Microsoft Defender
  • SIEM: Splunk, Sentinel, Chronicle, and Elastic

These integrations power SMART Tagging, enabling automatic alerts for missed or broken detections, automated data capture for assessments, and enhanced reporting capabilities. These integrations ensure broad team support for red teaming, detection engineering, controls validation, and purple teaming, improving every organization's overall security efficacy.

Vulnerability Management Validation MVP: Introducing a new concept that allows security teams to assess the impact of new vulnerabilities or zero-day's. The Vulnerability Management Validation beta feature assesses the risk of a vulnerability within an organization's environment via a calculated Harvest Score, which can be used to adjust existing Vulnerability Priority Ratings (VPR) based on exposure tests. This score helps teams prioritize mitigating vulnerabilities more accurately by considering real-world impact potential considering deployed security controls.

Automating to Boost Team Effectiveness

Marc Brown, VP Sales & Product at SCYTHE, commented on the new release: "In today's environments, it's crucial to emulate real-world attacks, not just atomic tests, with the same level of realism and sophistication as the most advanced threats. SCYTHE 4.3 achieves this, enabling organizations to test and validate their defenses. And, with our latest integrations, we have automated Smart Tag Alerts and Purple Team Assessment data outcomes, ensuring that security teams can efficiently correlate their detection capabilities and address any gaps quickly."

With these updates, SCYTHE 4.3 continues to empower security teams with advanced tools for comprehensive threat emulation, better vulnerability management, and improved integration with essential security systems, driving greater resilience and proactive defense capabilities. For more information about SCYTHE's service offerings, please visit SCYTHE platform.

About SCYTHE

SCYTHE represents a paradigm shift in cybersecurity risk management, empowering organizations to Attack, Detect, and Respond efficiently. The SCYTHE platform enables collaboration between red, blue, and purple teams to build and emulate real-world adversarial campaigns. SCYTHE's innovative dual-deployment options and comprehensive features ensure a proactive cybersecurity approach. Headquartered in Miami, FL, SCYTHE is privately funded by distinguished partners dedicated to shaping a more resilient cybersecurity landscape. For more information, visit SCYTHE platform or connect with SCYTHE on Twitter @scythe_io.

Contacts

SCYTHE Inc.
Email: info@scythe.io

Media Contact:
Marc Brown
Phone: (727) 860-8178
Email: marc.brown@scythe.io

SCYTHE


Release Versions

Contacts

SCYTHE Inc.
Email: info@scythe.io

Media Contact:
Marc Brown
Phone: (727) 860-8178
Email: marc.brown@scythe.io

More News From SCYTHE

SCYTHE Recognized for OT/ICS Leadership with Selection Award in EPRI's ADVEDIA Project

COLUMBIA, Md.--(BUSINESS WIRE)--SCYTHE, the leading provider of advanced cyber security solutions, is proud to announce its award selection with EPRI’s Automated Device Vulnerability Exploitation and Defensive Impact Analysis (ADVEDIA) project. This innovative project aims to refine vulnerability detection, classification, and exploitability determination techniques for control system software, focusing on enhancing the security of operational technology (OT) and industrial control systems (ICS...

SCYTHE Unveils Version 4.2 of Its Flagship BAS+ Platform

COLUMBIA, Md.--(BUSINESS WIRE)--SCYTHE, the leading provider of advanced cybersecurity solutions, today announced the release of version 4.2 of its flagship adversarial emulation system, BAS+. This latest version introduces powerful new capabilities designed to significantly enhance cybersecurity operations, streamline integration processes, and provide comprehensive insights into system vulnerabilities and defense mechanisms. Key Enhancements in SCYTHE 4.2: Endpoint Cyber Hygiene Tests: The re...

SCYTHE Expands Service Offerings Helping Teams Accelerate Offensive Cyber Capabilities

COLUMBIA, Md.--(BUSINESS WIRE)--SCYTHE, the leading provider of advanced adversary emulation solutions, announces the expansion of its service offerings to empower organizations in the battle against constantly evolving cyber threats. With the rise in complex cyberattacks such as ransomware, supply chain compromises, and social engineering attacks, organizations require expert guidance and support to bolster their cybersecurity posture. Detecting, alerting, blocking, or isolating adversaries is...
Back to Newsroom