Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
PCI DSS Compliance and Pentesting
Learn which organizations need penetration tests for PCI DSS compliance and how consulting with one company for both can streamline the process.
Reverse Engineering and Exploiting Binaries: Hardware Hacking Part 4
In part four of our series on getting started with iot and hardware hacking, we explore reverse engineering and binary exploitation.
Start Your Cyber Career on the Help Desk
One way to break into cybersecurity is working the help desk. This article reviews how the skills learned on the help desk translate to a cybersecurity career.
Follina RCE Exploitation – CVE-2022-30190
Introduction It was reported on May 30th by Microsoft that the Microsoft Support Diagnostic Tool (MSDT) was being actively exploited to obtain RCE on systems. The vulnerability, which can be executed through malicious Office documents, can be used to access remote...
Should You Change Penetration Testing Vendors Each Year?
Learn more about the pros and cons of switching penetration testing vendors. There’s no one right answer, but we discuss the pros and cons of changing it up.
Top 4 Reasons Security Assessment Quotes are Different
Learn more about what factors cause pricing differences between similar security engagements to ensure you get exactly what you need.
Internal Persistence Techniques
Ensuring persistent access in a network is vital when conducting an internal penetration test. Learn about some of the most common tactics we use.
So You Want to Be a Hacker: 2022 Edition
Video Version: https://youtu.be/lhz0-qAQlBM Introduction Last year, I posted a blog (https://tcm-sec.com/so-you-want-to-be-a-hacker-2021-edition/) and video (https://www.youtube.com/watch?v=mdsChhW056A) on how to become an ethical hacker in 2021. Given that it...
Top 5 Vulnerabilities We See on Web Apps
TCM Security conducts web application penetration testing. In this article, we review the top five most common findings we see in client web applications.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








