Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
{"pageInfo":{"first":1,"last":12,"total":748,"currentPage":1,"totalPages":63,"pageTrigger":"page\/"},"body":"
\n \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n November 18 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach<\/h3>\n <\/div>\n \n

Introducing a custom model for understanding privileged roles in Microsoft Entra ID, developed by TrustedSecWhenever our team conducts a Hardening Review of\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n November 13 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

Helpful Hints for Writing (and Editing) Cybersecurity Reports<\/h3>\n <\/div>\n \n

When it comes to reading (and editing) (and proofreading) technical documents, it's important to remember that the details are key, and can make all the\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n November 06 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

CMMC Subcontractors and Service Providers<\/h3>\n <\/div>\n \n

Defense contractors are preparing their systems for the start of the upcoming CMMC rollout but what they may not have considered is how their relationship with\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n October 28 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

Hack-cessibility: When DLL Hijacks Meet Windows Helpers<\/h3>\n <\/div>\n \n

In preparation for a talk, Jason Lang (@curi0usJack) and I were doing at MCTTP about mining TTPs from VX-underground, we both ended up doing research based on\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n October 21 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

Detecting Password-Spraying in Entra ID Using a Honeypot Account<\/h3>\n <\/div>\n \n

Password-spraying is a popular technique which involves guessing passwords to gain control of accounts. This automated password-guessing is performed against\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n October 16 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

There's More than One Way to Trigger a Windows Service<\/h3>\n <\/div>\n \n

Service triggers can be a pentester\u2019s secret weapon, letting low-priv users quietly fire up powerful services like Remote Registry and EFS. Learn how they can\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n October 10 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

Skimming Credentials with Azure's Front Door WAF<\/h3>\n <\/div>\n \n

Your Web Application Firewall (WAF) sees EVERYTHING. In this blog, we demonstrate how an attacker with access to Azure Front Door\u2019s WAF and Log Analytics can\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n October 07 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

PCI P2PE vs. E2EE \u2013 Scoping it Out<\/h3>\n <\/div>\n \n

If your payment processor says they use \u201cEnd-to-End Encryption\u201d your PCI DSS compliance scope may be bigger than you expect. In this blog, we break down how\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n
\n
\n \n \"\"<\/picture><\/div>\n
\n
\n
\n \n \n Blog\n <\/span>\n \n \n October 02 2025\n <\/span>\n <\/span>\n <\/div>\n \n
\n

HIPAA Applicability - Understanding the Security, Breach Notification, and Privacy Rules<\/h3>\n <\/div>\n \n

In this blog, we explain how HIPAA\u2019s Privacy, Security, Breach Notification, and Administrative Rules apply while clearing up common misunderstandings about\u2026<\/p>\n<\/div>\n <\/div>\n

\n \n Read about this article<\/span><\/span><\/div>\n <\/div>\n <\/div>\n
<\/div>\n<\/a> \n \n