Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
TCM SOC Analyst Certification Roadmap
This SOC analyst certification roadmap from TCM will help you develop and prove defensive cyber security skills, from beginner to advanced.
How to Pass the Practical SOC Analyst Associate (PSAA) Exam
PJSA and SOC 101 creator Andrew Prince shares his advice for how to prepare for and pass the Practical Junior Security Analyst certification exam.
How to Be an Ethical Hacker in 2025
Learn more about the topics, skills, and tools you should learn if you are interested in becoming an ethical hacker or penetration tester in 2025.
Six Tips For Better Domain Administrator Management
Domain Administrator accounts are often the target of advisories and rightfully so as their access typically gets you into anything you’d like within an organization. However, through years of security testing there are trends of poor account management with this...
Is Metadata Helping Your Attackers?
Publishing documents and sharing media on your website seems harmless at the surface level but lurking underneath could be the crux of your security program. Metadata stored on documents could be leaking information and aiding adversaries in attacking your...
Top 5 Ways COVID Changed Security Assessments
There is no doubt that COVID has changed how the world conducts business, so it’s no surprise that security assessments have as well. The increase in remote employees and the need for availability of applications and resources from afar has disrupted organizational...
So You Want to Be a Hacker: 2021 Edition
Video Version: https://www.youtube.com/watch?v=mdsChhW056A Introduction Recently, I posted a 36-part Twitter thread (https://twitter.com/thecybermentor/status/1343471814132031488) on how to become an ethical hacker in 2021. Given that it was well received, I thought...
Pentest Tales #001: You Spent How Much on Security?
Welcome to the first edition of Pentest Tales, a blog series that walks through real-world pentests we've performed in the past. The purpose of this blog is not just to share the "owning" of a domain, but to provide education as to why a domain was owned in the first...
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.







