Tyler Hudak

Practice Lead, Incident Response


Tyler has over 20 years of real-world experience in incident handling, malware analysis, computer forensics, and information security for multiple organizations. He has spoken and taught at a number of security conferences about topics ranging from incident response to penetration testing techniques.

Education & Certifications

  • BS Computer Science, University of Akron
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Forensic Examiner (GCFE)

Industry Contributions

MASTIFF Static Analysis Framework

Passion for Security

Tyler’s passion for incident response stems from his love of solving puzzles. He uses this ambition to get to the bottom of issues at hand; whether it’s forensic analysis of a disk, reverse engineering or malware, or the latest CTF contest, Tyler is driven to uncover every detail.

Recent Blog Posts

Critical Vulnerability in Progress MOVEit Transfer: Technical Analysis and Recommendations

On May 31, 2023, Progress Software released a security bulletin concerning a critical vulnerability within MOVEit Transfer, a widely used secure file transfer system. According to Shodan, over 2500 servers running this software are on the Internet. TrustedSec has performed analysis on the vulnerability and post-exploitation activities. CVE-2023-34362 has been assigned to this vulnerability. This...
ESXiArgs on the TrustedSec Blog

ESXiArgs: What you need to know and how to protect your data

Threat Overview Around February 03, 2023, a ransomware campaign called “ESXiArgs” emerged that targeted Internet-facing VMware ESXi servers running versions older than 7.0. Though not confirmed, it has been reported by the French CERT (CERT-FR), BleepingComputer, and other sources that the campaign leverages CVE-2021-21974, which is a three-year-old vulnerability in the OpenSLP component of the...

To OOB, or Not to OOB?: Why Out-of-Band Communications are Essential for Incident Response

tl;dr Communications are critical during an incident. If you cannot coordinate, collaborate, and inform actions and information about an incident, the incident response will eventually fail. Normally, this isn’t an issue, as organizations have resources like Microsoft 365 email, SharePoint, Slack, and Teams to use to communicate with each other. However, what happens when those...
View all posts from Tyler

Recent Webinars

Cybersecurity Research Trends

Panelists: Carlos Perez, Liz Waddell  Guest: Tyler Hudak  Keeping pace with the rapidly evolving cybersecurity industry while comprehending the bigger picture is a challenge for every security practitioner. Effectively translating insights into practical improvements for your craft and security team...

Elevate Your Threat Hunting Program: Actionable Advice from IR Experts

Threat hunting is an essential component of any modern security program, providing a proactive approach to detecting threats. As attackers become more sophisticated, it’s crucial to go beyond entry-level techniques and tactics. However, most webinars and trainings on threat hunting...

Log4j: Live Update Webcast

Presented by TrustedSec & Binary Defense on December 14, 2021. During this live webcast we are covering the latest news and guidance on the Log4j vulnerability and what organizations can do to detect and respond to it. We will discuss...
View all webinars from Tyler

Want to work with Tyler Hudak or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us