Skip to Main Content

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
Blog June 17 2025

Attacking JWT using X509 Certificates

Take a closer look at JWT signature verification using X.509 headers as we walk through an attack and demonstrate a Burp extension to exploit a known…

Read about this article
Blog June 13 2025

Dragging Secrets Out of Chrome: NTLM Hash Leaks via File URLs

Figure 1 - We take our work very seriously. Capturing Hashes with DragonHashChromium-based browsers have an odd feature set that allows extensive drag-and-drop…

Read about this article
Blog June 12 2025

Hunting Deserialization Vulnerabilities With Claude

In this post, we are going to look at how we can find zero-days in .NET assemblies using Model Context Protocol (MCP).SetupBefore we can start vibe hacking, we…

Read about this article
Blog June 10 2025

Common Mobile Device Threat Vectors

Mobile devices are a must have in today’s world for communication. With that being said, these devices do come with some risks when it comes to personal data.…

Read about this article
Blog June 05 2025

Full Disclosure, GraphGhost: Are You Afraid of Failed Logins?

Another year, another vuln…It's that time again.Last year I disclosed the existence of GraphNinja - a (now fixed) vulnerability in Azure where you could…

Read about this article
Blog June 03 2025

Teaching a New Dog Old Tricks - Phishing With MCP

As AI evolves with MCP, can a new “dog” learn old tricks? In this blog, we test Claude AI’s ability to craft phishing pretexts—and just how much effort it…

Read about this article
Blog May 29 2025

Apples, Pears, and Oranges: Not All Pentest Firms Are the Same

Penetration testing is not a commodity service. If you are a procurer of penetration tests and have ever received wildly different quotes for the "same"…

Read about this article
Blog May 22 2025

AppSec Cheat Sheet: Session Management

Session Management Testing - CookiesThe Cheat Sheet section is for quick reference and to make sure steps don’t get missed.The Learn section is for those who…

Read about this article
Blog May 20 2025

Red Team Gold: Extracting Credentials from MDT Shares

When it comes to targeting enterprise deployment infrastructure during a Red Team engagement, SCCM (System Center Configuration Manager) tends to get all the…

Read about this article
Blog May 15 2025

Purpling Your Ops

How does one Purple Team? TAC Practice Lead Megan Nilsen shares open-source tools, techniques, and tips for security practitioners exploring Purple Teaming,…

Read about this article
Blog May 08 2025

I Got 99 Problems But a Log Ain’t One

1.1 IntroductionHere at TrustedSec, one of the goals of the Tactical Awareness & Countermeasures (TAC) team is to assess and enhance our partners' security…

Read about this article
Blog May 06 2025

Application Layer Encryption with Web Crypto API

OverviewIn web and mobile applications, we’ve been fortunate over the years to have such widespread use of HTTPS by way of TLS. The proliferation of HTTPS is…

Read about this article

Loading...