Browse our blogs
We cover it all in The Security Blog. Discover what you’ve been looking for.
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/PCIApplaudFAQ1572_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1721396469&s=743d920e23eee10a7f955d19017309bf)
Lapse of Control: Applauding PCI SSC for FAQ 1572
I want to applaud the PCI Security Standards Council (PCI SSC) for FAQ 1572 published in March of 2024 for simply and effectively answering a question asked by…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/ComplianceKryptonite_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1720468763&s=d9b3d4341e1b194197ef0afc0cdcb385)
What is Your Compliance Kryptonite?
Have you ever felt frustrated about security compliance? Well, you're not alone. We've all got some kind of 'Kryptonite' when it comes to Compliance. I asked…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/TechAnalysisKillerUltraMalware_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1720725321&s=8117d39aca0bcdea4b0f45814d6022c4)
Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks
This post was written by John Dwyer, Director of Security Research at Binary Defense, and made possible through the contributions of TrustedSec Senior Research…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/DirDevilHidingData_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1718286663&s=90b67253fa7d737e0545f400d3456ccc)
dirDevil: Hiding Code and Content Within Folder Structures
Welcome back to another round of "Hiding in Plain Sight," exploring weird places to stash data or payloads. In our last edition, we explored an easy method of…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/DavesRuleOfFive_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1719932409&s=676a1946880b40b4268d8763cbb1a7d2)
HackingDave’s Rule of Five
Buckle up! This is a different type of blog that isn’t our normally scheduled technical prowess or superhuman talents we have here at TrustedSec. Each month, I…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/DangersOfTransitionMode_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1719499083&s=acf58016d5763b099884d4cb6ec2da30)
The Dangers of Transition Mode
With the introduction of WPA3, it is becoming increasingly difficult to successfully exploit a wireless network. One of the main enhancements introduced in…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/PlayingGamesPCIDeadlines_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1718802450&s=f04322c5b92448417e5bd86fa3899655)
Playing Games with PCI Compliance Deadlines
The new version 4.0 of the PCI DSS standard that applies to organizations that handle payment cards is now mandatory as of April 01, 2024. As a QSA, I’ve heard…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/CloneACloner_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1717771318&s=938442b5ed78dbf3d96d98352e5c817a)
Let’s Clone a Cloner...To Meet My Needs
It was my second Physical Penetration Test here at TrustedSec and I was paired with colleague Paul Burkeland. After arriving at the hotel, Paul stated that he…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/TipsTricksFirstCon_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1718118660&s=fa2935669390913a71793727f890cf5d)
Tips and Tricks on Creating Your First Conference Talk
Have you ever attended a security conference (or any conference for that matter) and thought about giving a presentation yourself, but don't know where to…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/HandsOnChipOff_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1717513844&s=48c33a2c4a3b21f7a40ca0190cb8f0a1)
Hands On with Chip Off Non-Volatile Memory
1.1 Introduction - Why We're HereWelcome to a deep dive into desoldering Non-Volatile storage chips! At the time of publishing, this is a recreation of my own…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/EverythingJQuery_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1716917608&s=39171ff4c0d5f8c5fb5914208c9034e4)
Everything You Need to Know About jQuery and its Vulnerabilities
IntroductionJavaScript is used in some way on almost all modern web applications. There are several popular libraries that websites utilize, and each come with…
![](https://trusted-sec.transforms.svdcdn.com/production/images/Blog-Covers/IntroducingTheShelf_Summary.jpg?w=400&h=400&auto=compress%2Cformat&fit=crop&dm=1717435784&s=a137a825c4938db47db1a639084a678a)
Introducing The Shelf
As an independent security consulting firm, we develop many custom capabilities over time. What happens when we decide that a capability no longer suits our…
Loading...