Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
AI Tools and Certification Exams: What’s Changing and Why
AI tools are now a normal part of how cybersecurity professionals work, and that puts certification programs in an interesting position: how do we balance real-world tool usage with academic integrity concerns? After careful consideration, we've updated our Terms and...
11 Types of Ethical Hacking: The Definitive Guide for 2026
There are 11 distinct types of ethical hacking, and most organizations only think about two or three of them. Everything outside that narrow band is a blind spot, and blind spots are where breaches happen. A colleague of mine once ran a quick social engineering test...
TCM Academy Course Release: Securing AI Applications
Learn more about the latest addition to the TCM Security Academy.
What is Ethical Hacking
Ethical hacking is the authorized practice of testing computer systems, networks, and applications to find vulnerabilities before malicious attackers do. What separates ethical hackers from their malicious counterparts isn't the techniques they use, its permission....
What Happened When We Invited Hackers to Break our AI Chatbot
In November we hosted an AI Hacking CTF Challenge as part of TCM’s annual Black Friday Sale. The challenge was straightforward: convince the chatbot to reveal the secret code that it knew, but was instructed to keep secret. For some contestants it was simple, they had...
OWASP Top 10 2025 Explained: Insights from a Web Application Pentester
Introduction Earlier this year I published an OWASP Top 10 2025 prediction blog where I pulled CVE data from 2021 and made data driven predictions on where the new top 10 list will land. Now that the official list has been released, it’s time to reflect on the results...
Ethically Hack AI | Part 2 – Prompt Injection
This blog will demonstrate how various methods of prompt injection, including jailbreaking, can be used to compromise AI chatbots during ethical testing.
How To Become A SOC Analyst
This blog explores the duties of a SOC analyst, lasting motivations for pursuing defensive cyber security, and resources to get started and progress in the SOC.
Network VS Cloud Penetration Testing
This article defines cloud pentesting, explores the relationship between traditional network and cloud pentesting, and explains how to learn cloud pentesting.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








