by TCMS Staff | Dec 15, 2025 | Artificial Intelligence
In November we hosted an AI Hacking CTF Challenge as part of TCM’s annual Black Friday Sale. The challenge was straightforward: convince the chatbot to reveal the secret code that it knew, but was instructed to keep secret. For some contestants it was simple, they had...
by TCMS Staff | Dec 3, 2025 | Web Applications
Introduction Earlier this year I published an OWASP Top 10 2025 prediction blog where I pulled CVE data from 2021 and made data driven predictions on where the new top 10 list will land. Now that the official list has been released, it’s time to reflect on the results...
by TCMS Staff | Nov 17, 2025 | Artificial Intelligence, Penetration Testing
Did You Cover the Basics? In the first part of this blog series, “Demystifying Neural Networks and LLMs,” we took a look at the basics of how LLMs work, including some of the core functionality that inherently makes them vulnerable to things like prompt injection and...
by TCMS Staff | Oct 22, 2025 | Artificial Intelligence, Penetration Testing
DeepSeek and You Shall Find: Automating Pentest Reports with AI-Powered Templates for 63 Cents Since the dawn of time, reporting has been the bane of every pentester’s existence. It’s often the most tedious part of the job and is almost always highlighted as something...
by TCMS Staff | Aug 20, 2025 | Artificial Intelligence, Learning
Series Intro (AKA Why You Should Care About This) If your news feeds are anything like mine, then you’re probably being bombarded with constant updates about new AI breakthroughs, models, products, or how organizations are adapting it into their workflows. We are...