We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.
Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.
Black Hat USA Training - Applied Threat Hunting and Detection Engineering
Registration is now open for our Black Hat training on August 3-6, 2024
Security Noise - Episode 6.20
Targets Operations, Co-Pwnership
Most Reported Web Findings of 2023
I reviewed the findings from the application and API assessments that the TrustedSec Software Security Team conducted during 2023 to see what issues we were…
Preparing for NIST CSF 2.0: Practical Tips for Implementation
TrustedSec’s Senior Security Consultant Jared McWherter and Advisory Solutions Director Alex Hamerstone provide actionable advice for aligning your…
XZ Utils Made Me Paranoid
On March 28, 2024, the news about the XZ Utils backdoor came out. Since then, I’ve been thinking about how we could identify these backdoors before packages…
The Midnight Alert: Navigating the Dark Web Data Dilemma
In the dead of night, an ominous message hits your inbox: "Your company's sensitive data is for sale on the dark web." As the Chief Information Security…
Full Disclosure: A Look at a Recently Patched Microsoft Graph Logging Bypass - GraphNinja
From June 2023 to March 2024, Microsoft Graph was vulnerable to a logging bypass that allowed attackers to perform password-spray attacks undetected. During…
Security Noise - Episode 6.19
InfoSec: Cybersecurity Education at Bedford High
Loading DLLs Reflections
We're back with another post about common malware techniques. This time we're not talking about process hollowing. We are going to branch off and talk about…
PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 3
Related RequirementsThis is part three (3) of a three (3) part series on PCI DSS version 4.0 requirement 6.3.1, for identification and management of…
Enter the Sandbox: Impede Detection Platform v1.1 Release
Join us for our webinar with Director of Product Operations Ben Mauch, where you can get a look at the new Impede Detection Platform updates and the all-new…
PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 2
Risk RankingThis is part two (2) of a three (3) part series on PCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities.…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.