by TCMS Staff | Dec 3, 2025 | Web Applications
Introduction Earlier this year I published an OWASP Top 10 2025 prediction blog where I pulled CVE data from 2021 and made data driven predictions on where the new top 10 list will land. Now that the official list has been released, it’s time to reflect on the results...
by TCMS Staff | Nov 17, 2025 | Artificial Intelligence, Penetration Testing
Did You Cover the Basics? In the first part of this blog series, “Demystifying Neural Networks and LLMs,” we took a look at the basics of how LLMs work, including some of the core functionality that inherently makes them vulnerable to things like prompt injection and...
by TCMS Staff | Oct 22, 2025 | Artificial Intelligence, Penetration Testing
DeepSeek and You Shall Find: Automating Pentest Reports with AI-Powered Templates for 63 Cents Since the dawn of time, reporting has been the bane of every pentester’s existence. It’s often the most tedious part of the job and is almost always highlighted as something...
by TCMS Staff | Aug 20, 2025 | Artificial Intelligence, Learning
Series Intro (AKA Why You Should Care About This) If your news feeds are anything like mine, then you’re probably being bombarded with constant updates about new AI breakthroughs, models, products, or how organizations are adapting it into their workflows. We are...
by TCMS Staff | Aug 1, 2025 | TCMS News
In response to feedback from our community, the TCM Security team is pleased to announce some changes to our live training offerings to make certification prep more accessible and set every student up for success on their cybersecurity credentialing journeys! ...