Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
11 Types of Ethical Hacking: The Definitive Guide for 2026
There are 11 distinct types of ethical hacking, and most organizations only think about two or three of them. Everything outside that narrow band is a blind spot, and blind spots are where breaches happen. A colleague of mine once ran a quick social engineering test...
What is Ethical Hacking
Ethical hacking is the authorized practice of testing computer systems, networks, and applications to find vulnerabilities before malicious attackers do. What separates ethical hackers from their malicious counterparts isn't the techniques they use, its permission....
What Happened When We Invited Hackers to Break our AI Chatbot
In November we hosted an AI Hacking CTF Challenge as part of TCM’s annual Black Friday Sale. The challenge was straightforward: convince the chatbot to reveal the secret code that it knew, but was instructed to keep secret. For some contestants it was simple, they had...
Vulnerability Scanning VS Pentesting
Understanding the difference between vulnerability scanning and penetration testing is important for moving past automated testing and into manual testing.
AI Assisted Pentest Reporting
In this blog, we’ll show how to generate pentest finding templates with DeepSeek AI using MITRE’s Common Weakness Enumeration (CWE) categories.
AI-Automated Credential Stuffing
Credential stuffing remains one of the most efficient paths to account takeover, and AI assistance is changing the scale and effectiveness of those attacks.
OSINT Resources and Tools
Explore some of the fundamental domains of OSINT research, plus a list of tools and resources to develop this discipline as a cyber security professional.
Networking Fundamentals for Pentesters
We will take a look at networking concepts you should focus on, why they matter, and resources for learning for beginning pentesters without an IT background.
The PSAA: SOC Experience Certification
The PSAA certification is designed to give you knowledge and hands-on SOC experience, while signaling to employers that you can contribute on day one.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








