Programming with AI: Mini Course

Programming with AI: Mini Course

Overview Embarking on a journey to learn programming can be both exciting and challenging. Our new course is designed with the beginner in mind, focusing on the essentials of clean, efficient coding, with a unique twist: we’re integrating AI to help you along the way....
Avoid “OR 1=1” in SQL Injections

Avoid “OR 1=1” in SQL Injections

Overview Despite its popularity as an SQL injection example, we argue that “OR 1=1” presents more risks than rewards. It may work for login bypasses occasionally, but its reliability is questionable, and better alternatives exist. We explore the drawbacks,...
Burp Extension Dev Part 1: Setup & Basics

Burp Extension Dev Part 1: Setup & Basics

Overview In this blog post series, we’ll guide you through the process of creating Burp extensions. First, we will set up your development environment. Then, we will create a basic extension to add a custom feature to Burp Suite. Over the course of the series,...
Password Managers and Guidelines: Mastering Your Passwords

Password Managers and Guidelines: Mastering Your Passwords

Overview TCM Security is continuing the  “Practical Cybersecurity Awareness” four-part series this week during Cybersecurity Awareness Month. Today we continue our four-part series with learning how to harness password managers for enhanced Digital Security.  Securing...
What is an Internal Penetration Test?

What is an Internal Penetration Test?

Introduction An internal penetration test is a simulated attack on a network or system conducted from within an organization’s internal network. The objective of an internal penetration test is to identify vulnerabilities and weaknesses in the network or system...