Browse our blogs
We cover it all in The Security Blog. Discover what you’ve been looking for.

The Hidden Trap in the PCI DSS SAQ A Changes
Implementing requirements 6.4.3 and 11.6.1, or using a WAF to protect against script-based attacks, to meet PCI SSC's new eligibility criterion for SAQ A…

A Threat Hunter’s Guide to Decoding the Cloud
This blog will guide you through how to be a successful threat hunter in cloud environments, along with some helpful tips and advice.

Exploring NTDS.dit – Part 1: Cracking the Surface with DIT Explorer
NTDS.dit is the file housing the data for Windows Active Directory (AD). In this blog post, I’ll be diving into how the file is organized. I’ll also be walking…

Getting Started Using LLMs in Application Testing With an MVP
Are you interested in incorporating Large Language Models (LLMs) into app tests yet lack the tooling to get you there? This blog walks through how to start…

From RAGs to Riches: Using LLMs and RAGs to Enhance Your Ops
1.1 IntroductionIn this blog, I will explore Retrieval-Augmented Generation (RAG) and how it can be applied to research capabilities. RAG is a framework…

Operating Inside the Interpreted: Offensive Python
Discover how to use Python for malicious purposes on Windows, leveraging its ease of installation and existing tradecraft to evade detection and deploy malware…

Command Line Underdog: WMIC in Action
My typical engagements are mostly Red Teams, so I do not often get a chance to play with terminal server application breakouts—but on a recent engagement, I…

Solving NIST Password Complexities: Guidance From a GRC Perspective
Understand NIST's Digital Identity Guidelines for secure password implementation and access control, ensuring risk-based authentication and minimizing breaches…

Malware Series: Process Injection Mapped Sections
This post explains a common malware technique using shared memory sections to inject and execute code in a remote process, demonstrating the process in C and…

Top 10 Blogs of 2024
At TrustedSec, we are all about leveraging our collective intelligence and knowledge to uplift the cybersecurity community. One of our most popular educational…

On-Demand BOF
Learn from the experts at TrustedSec on-demand, build BOFs with confidence, and gain hands-on experience with two previously unreleased tools, including a…

Discovering a Deserialization Vulnerability in LINQPad
Discovering a Deserialization Vulnerability in LINQPad, written by James Williams, reveals a novel deserialization vulnerability in a.NET application with over…

The Hidden Trap in the PCI DSS SAQ A Changes
Implementing requirements 6.4.3 and 11.6.1, or using a WAF to protect against script-based attacks, to meet PCI SSC's new eligibility criterion for SAQ A…

A Threat Hunter’s Guide to Decoding the Cloud
This blog will guide you through how to be a successful threat hunter in cloud environments, along with some helpful tips and advice.

Exploring NTDS.dit – Part 1: Cracking the Surface with DIT Explorer
NTDS.dit is the file housing the data for Windows Active Directory (AD). In this blog post, I’ll be diving into how the file is organized. I’ll also be walking…

Getting Started Using LLMs in Application Testing With an MVP
Are you interested in incorporating Large Language Models (LLMs) into app tests yet lack the tooling to get you there? This blog walks through how to start…

From RAGs to Riches: Using LLMs and RAGs to Enhance Your Ops
1.1 IntroductionIn this blog, I will explore Retrieval-Augmented Generation (RAG) and how it can be applied to research capabilities. RAG is a framework…

Operating Inside the Interpreted: Offensive Python
Discover how to use Python for malicious purposes on Windows, leveraging its ease of installation and existing tradecraft to evade detection and deploy malware…

Command Line Underdog: WMIC in Action
My typical engagements are mostly Red Teams, so I do not often get a chance to play with terminal server application breakouts—but on a recent engagement, I…

Solving NIST Password Complexities: Guidance From a GRC Perspective
Understand NIST's Digital Identity Guidelines for secure password implementation and access control, ensuring risk-based authentication and minimizing breaches…

Malware Series: Process Injection Mapped Sections
This post explains a common malware technique using shared memory sections to inject and execute code in a remote process, demonstrating the process in C and…

Top 10 Blogs of 2024
At TrustedSec, we are all about leveraging our collective intelligence and knowledge to uplift the cybersecurity community. One of our most popular educational…

On-Demand BOF
Learn from the experts at TrustedSec on-demand, build BOFs with confidence, and gain hands-on experience with two previously unreleased tools, including a…

Discovering a Deserialization Vulnerability in LINQPad
Discovering a Deserialization Vulnerability in LINQPad, written by James Williams, reveals a novel deserialization vulnerability in a.NET application with over…
Loading...