by Josh Daniels | Oct 8, 2025 | Security
As our personal lives, businesses, entertainment, and communities move deeper into digital spaces, various levels of Open Source Intelligence (OSINT) have become commonplace. From verifying a suspicious social media account to conducting a highly targeted phishing...
by TCMS Staff | Jul 30, 2025 | Cybersecurity Awareness, Security
Usually, I pride myself in being able to spot a phishing email from a mile away, however, I’ve always maintained that anyone, even the most security-minded individual, could be phished with enough research and time. Recently, I was targeted by a few phishing...
by TCMS Staff | Jul 16, 2025 | Security, Web Applications
Every web application is vulnerable to a type of attack in which a malicious third party repeatedly connects to your web server and/or makes bulk HTTP requests, consuming resources and preventing other legitimate requests from being processed. This is called a Denial...
by TCMS Staff | Mar 19, 2025 | Security, SOC
In 2025, phishing is still one of the most ubiquitous and effective attack vectors cybercriminals use to steal credentials, distribute malware, and compromise organizations. Oftentimes, these phishing campaigns stem from deceptive URLs which are crafted to appear...
by Alex Tushinsky | Sep 18, 2024 | Security
I often hear from people that audits are “brutal” and that passing a SOC 2 audit is a significant accomplishment. Most people I talk to feel that an audit is a burden and that passing it takes a lot of extra, unnecessary effort. At TCM Security, we...
by Alex Olsen | Oct 4, 2023 | Security, Web Applications
Overview NoSQL databases, a term that stands for “Not Only SQL,” represent a shift from traditional relational databases. Unlike their SQL-based counterparts that rely heavily on tables and fixed schemas, NoSQL databases provide flexible storage...