Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials

TCM Pentester Certification Roadmap
How can you become a pentester? Follow TCM’s learning path and go from no IT experience to a professional penetration tester.

How Often Should You Have A Pentest?
Most organizations will need at least one pentest annually, but some more frequent pentesting can be beneficial for finding vulnerabilities and reducing risk.

OWASP Top 10 Prediction | 2025
In this blog, we will make a prediction about the OWASP Top Ten for 2025 by taking a look at CVE data from 2021 through 2024.

Python vs C# – A Pentester Perspective
Python is arguably the preferred language of the hacking community, but I will explain how learning C# makes you a more versatile and in-demand ethical hacker.

SOC Tools Every Analyst Should Know
This blog will dive into the general categories of SOC tools and techniques crucial for succeeding as an analyst and list a few specific examples.

How to Learn Assembly: Beginner Project
Start learning the assembly coding language with a simple project by following the steps as we break the code down into manageable sections.

Social Engineering And External Pentests
In this article, we will explore the benefits and drawbacks of social engineering and how to best include this tactic when defining the scope of an external pentest.

Protecting Your Network With Honeypots
Set up a honeypot to trap hackers and learn about the tactics, techniques, and procedures they may be using to try and break into an organization’s systems.

Prototype Pollution: Advanced Web Hacking
An outline of the elements of the prototype pollution JavaScript vulnerability, how it functions, how to test for it, and how to exploit it in a pentesting situation.

Ethical Hacker Gift Guide 2024
The staff at TCM Security have offered some suggestions for those looking to buy gifts for ethical hackers this holiday season.
Penetration Testing - PCI Compliance - Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.