Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
TCM Security Announces Updates to Live Training Offerings
In response to feedback from our community, the TCM Security team is pleased to announce some changes to our live training offerings to make certification prep more accessible and set every student up for success on their cybersecurity credentialing journeys! ...
Beginner’s Guide to Code Review for Web App Pentesters
Explore the web app pentesting method of code review, including how you can get started with a basic methodology and a walk through of practical examples.
Cyber Security Career Stories: How A Free IT Course Led To A Cyber Job
Follow the cyber career journey of an offensive security hopeful as his persistent learning, a fatefully timed beta test, and networking lands him a cyber job.
Projects to Land Your First Cybersecurity Job
Gaining experience in cybersecurity before landing a job can be tricky. However, side projects are an excellent way to gain experience and impress recruiters.
Find and Exploit Server-Side Template Injection (SSTI)
Server-Side Template Injection (SSTI) is an attack that allows an attacker to inject malicious input into a templating engine, leading to code execution on the server. While this vulnerability can be quite impactful, understanding and exploiting it requires a good...
Find and Exploit Blind SSRF with Out-of-Band (OOB) Techniques
Server-Side Request Forgery (SSRF) is a vulnerability that let’s an attacker have a server make requests on their behalf. Typically this can allow the attacker to reach internal resources that would otherwise be unavailable. Whilst the typical SSRF is dangerous...
Understanding and Hacking GraphQL: Part 1
GraphQL, a query language for your API and a server-side runtime for executing those queries, is rapidly becoming a prevalent technology in modern web applications. This technology, developed by Facebook in 2012 and released as an open-source project in 2015, provides...
XPath Injection: A Beginners Guide
Overview XPath Injection, akin to other common injection attacks, specifically targets vulnerabilities within an application's user input processing system. But what sets XPath Injection apart is its exploitation of XPath queries. The fallout? Unauthorized access to...
Do I Need to Learn Linux?
Learning Linux can be valuable for individuals who want to become ethical hackers or offensive security specialists. Find out why Linux is good to learn.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








