Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials

Coding Projects for Beginners
This blog post will provide some tips and suggest a few project ideas to help you acquire and develop programming skills to advance your coding abilities.
Python vs C# – A Pentester Perspective
Python is arguably the preferred language of the hacking community, but I will explain how learning C# makes you a more versatile and in-demand ethical hacker.
Introduction To Digital Privacy
This article contains actionable steps and resources to help you practice digital privacy, stop data brokers from collecting your information, and restore a sense of freedom and peace of mind.
How to Learn Assembly: Beginner Project
Start learning the assembly coding language with a simple project by following the steps as we break the code down into manageable sections.
Social Engineering And External Pentests
In this article, we will explore the benefits and drawbacks of social engineering and how to best include this tactic when defining the scope of an external pentest.
Protecting Your Network With Honeypots
Set up a honeypot to trap hackers and learn about the tactics, techniques, and procedures they may be using to try and break into an organization’s systems.
Prototype Pollution: Advanced Web Hacking
An outline of the elements of the prototype pollution JavaScript vulnerability, how it functions, how to test for it, and how to exploit it in a pentesting situation.
Ethical Hacker Gift Guide 2024
The staff at TCM Security have offered some suggestions for those looking to buy gifts for ethical hackers this holiday season.
PimpMyKali (PMK) v 2.0 Release
Pimpmykali is a tested post-installation automation script that takes the headache, research, and guesswork out of proper Kali installation and tuning.
How to Pass the PIPA Certification Exam
Practical IoT Pentest Associate (PIPA) certification creator Andrew Bellini shares his insider tips for passing the PIPA exam.
Penetration Testing - PCI Compliance - Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.