We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Black Hat USA Training - Adversary Tactics and Threat Hunting
During our Black Hat training, you will learn hands-on attacks that directly correlate to industry relevant TTPs, while performing threat hunting exercises and…

So You Wanna Be a Hacker? Starting Your InfoSec Career
Join Principal Security Consultant Adam Compton and Senior Security Consultant David Boyd as they demystify the cybersecurity career landscape, from red…

Apples, Pears, and Oranges: Not All Pentest Firms Are the Same
Penetration testing is not a commodity service. If you are a procurer of penetration tests and have ever received wildly different quotes for the "same"…

AppSec Cheat Sheet: Session Management
Session Management Testing - CookiesThe Cheat Sheet section is for quick reference and to make sure steps don’t get missed.The Learn section is for those who…

Attack and Defense: Hard-Won Insights From Purple Team Operations
Join Security Consultants Mike Spitzer, Zach Bevilacqua, and Travis Steadman to learn how to navigate what comes next after your Purple Team engagement.

Red Team Gold: Extracting Credentials from MDT Shares
When it comes to targeting enterprise deployment infrastructure during a Red Team engagement, SCCM (System Center Configuration Manager) tends to get all the…

Purpling Your Ops
How does one Purple Team? TAC Practice Lead Megan Nilsen shares open-source tools, techniques, and tips for security practitioners exploring Purple Teaming,…

Security Noise - Episode 7.16
In this episode of Security Noise, we talk with Senior Research Analyst Alex Ball about his new open-source tool DIT Explorer. Watch it now to learn what it…

I Got 99 Problems But a Log Ain’t One
1.1 IntroductionHere at TrustedSec, one of the goals of the Tactical Awareness & Countermeasures (TAC) team is to assess and enhance our partners' security…

Application Layer Encryption with Web Crypto API
OverviewIn web and mobile applications, we’ve been fortunate over the years to have such widespread use of HTTPS by way of TLS. The proliferation of HTTPS is…

Why the WAF
In my experience, most organizations are prepared to discuss the scope of penetration tests when preparing for an External or Internal Penetration Test, but…

Don't Burn Your Money: Top 5 Ways to Maximize Your Next Red Team
Join Targeted Operations Practice Lead Jason Lang and CTO Justin Elze as they go through the best (and worst) things you can do before, during, and after a red…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
