fbpx
A Beginner’s Guide to JSON

A Beginner’s Guide to JSON

Overview JSON permeates virtually every corner of the digital landscape today. It powers web APIs, configures files, fuels mobile apps, and anchors data storage. To maintain seamless day-to-day hacking, it’s crucial to wield a robust understanding of JSON....
How to Start Capture the Flag (CTF)

How to Start Capture the Flag (CTF)

Overview One of the most effective and engaging ways to hone one’s skills is through Capture The Flag (CTF) challenges. But what makes CTFs useful to budding and seasoned cybersecurity professionals alike? Let’s delve into the myriad benefits and ways to...
BURP Suite Macros: A Hands-On Guide

BURP Suite Macros: A Hands-On Guide

Introduction Fed up being slowed down by simple checks and functionality? Even seemingly simple CSRF tokens can get in the way of a straight-forward brute-force attack! Enter BURP Suite Macros, an indispensable tool that can be used to efficiently handle these...
Safe Browsing: Essential Practices

Safe Browsing: Essential Practices

Overview TCM is thrilled to continue the, “Practical Cybersecurity Awareness” blogs this week during Cybersecurity Awareness Month. The four topics discussed throughout the month of October will be compiled into a free course at TCM Academy available on...