by TCMS Staff | Jan 19, 2023 | Learning, Linux
If you are in the process of learning more about the world of information technology or cybersecurity, you’ve probably heard talk about the Linux Operating System. Unfortunately, in my experience, everyone made it appear to be an extremely POWERFUL and COMPLEX...
by TCMS Staff | Jan 13, 2023 | Help, Penetration Testing, Security
As with any industry, with jargon comes confusion and misunderstanding. 2022 saw a huge rise in the popularity of the buzz-word “Red Team”, but what is the essence of a Red Team? Popular opinion on social media may say “it’s a pentest with no scope,” but that’s a...
by TCMS Staff | Nov 28, 2022 | Penetration Testing
When on the cusp of receiving an external penetration test, clients want to prepare themselves for it. We often get asked what’s the easiest way to improve their score before the engagement has begun. Below are the top 3 ways to improve your external penetration...
by TCMS Staff | Nov 14, 2022 | Security
MFA stands for Multi-Factor Authentication. Microsoft helps clarify MFA as an additional step in the authentication process, “You need a second thing – what we call a second “factor” – to prove who you are.” When logging into your...
by TCMS Staff | Nov 8, 2022 | Penetration Testing, Security
Our last blog post regarding OSINT and Recon briefly discussed some exciting topics. In this blog post, we will continue with that thread and discuss some tradecrafts used by investigators and Pentesters. Only some investigators and pentesters utilize these exact...