by TCMS Staff | Nov 17, 2025 | Artificial Intelligence, Penetration Testing
Did You Cover the Basics? In the first part of this blog series, “Demystifying Neural Networks and LLMs,” we took a look at the basics of how LLMs work, including some of the core functionality that inherently makes them vulnerable to things like prompt injection and...
by TCMS Staff | Oct 22, 2025 | Artificial Intelligence, Penetration Testing
DeepSeek and You Shall Find: Automating Pentest Reports with AI-Powered Templates for 63 Cents Since the dawn of time, reporting has been the bane of every pentester’s existence. It’s often the most tedious part of the job and is almost always highlighted as something...
by TCMS Staff | Aug 20, 2025 | Artificial Intelligence, Learning
Series Intro (AKA Why You Should Care About This) If your news feeds are anything like mine, then you’re probably being bombarded with constant updates about new AI breakthroughs, models, products, or how organizations are adapting it into their workflows. We are...
by TCMS Staff | Aug 1, 2025 | TCMS News
In response to feedback from our community, the TCM Security team is pleased to announce some changes to our live training offerings to make certification prep more accessible and set every student up for success on their cybersecurity credentialing journeys! ...
by TCMS Staff | Jul 30, 2025 | Cybersecurity Awareness, Security
Usually, I pride myself in being able to spot a phishing email from a mile away, however, I’ve always maintained that anyone, even the most security-minded individual, could be phished with enough research and time. Recently, I was targeted by a few phishing...