Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials
Burp Extensions: GUI Design
Overview In part 4 of our series on creating extensions for Burp Suite using the Montoya API, we will learn about designing an interactive GUI for our extension. If you haven’t read the previous installments of this blog post series yet, we highly recommend you do...
Learn AppSec Testing in 2024
Unlock your AppSec career in 2024 with our expert guide. Master fundamentals, tools, and get real-world experience. Your path to success starts here!
Healthy Study Habits to Become a Pentester
The journey to becoming a Penetration Tester: Build focused study habits, manage time wisely, sleep well, and take effective notes for success.
How to Pass the PNPT Exam First Time
Alex Olsen shares his advice for how to pass the PNPT exam. Discover essential courses, study tips, and exam tactics for aspiring pentesters.
Programming with AI: Mini Course
Learn to code with AI: Enhance your skills with our beginner-friendly course on best practices, prompt engineering, and efficient development.
Avoid “OR 1=1” in SQL Injections
Discover the potential risks associated with “OR 1=1” SQL injections in cybersecurity assessments and why we should always be cautious when using it.
Burp Extension Dev Part 1: Setup & Basics
Learn Burp Suite extension development with the new Montoya API: Set up your dev environment and create custom Burp features!
The Practical Web Pentest Associate (PWPA) Exam
Gain practical skills in web app penetration testing with the PWPA certification, designed for beginners and experienced testers.
A Beginner’s Guide to JSON
JSON, the go-to for data interchange, thrives due to its simplicity. It bridges servers and clients, ensuring seamless data exchange in modern web apps.
How to Start Capture the Flag (CTF)
CTFs offer hands-on cybersecurity experience, enhancing troubleshooting skills, tech proficiency, and competitive prowess in a safe environment.
Penetration Testing – PCI Compliance – Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.