Blogs & Articles

Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials

Linux Isn’t Scary

Linux Isn’t Scary

Learning Linux is essential for aspiring ethical hackers. Start learning the fundamentals today and you will be well on your way to a career in cybersecurity.

Getting Started with Prototype Pollution

Getting Started with Prototype Pollution

Prototype pollution allows an attacker to modify the prototype of an object. This means we can potentially assign new properties or methods to an object. Furthermore, we may be able to overwrite existing properties. If you’re unfamiliar with prototypes and...

What is MFA?  Understanding Multi-Factor Authentication

What is MFA? Understanding Multi-Factor Authentication

MFA stands for Multi-Factor Authentication. Microsoft helps clarify MFA as an additional step in the authentication process, "You need a second thing - what we call a second "factor" - to prove who you are." When logging into your online account, you prove who you are...

How Hackers Target You

How Hackers Target You

When creating a defensive plan against cyber-attacks, knowing your adversary is paramount. Often after the shock has worn off from a breach, the affected company will ask themselves, "Why us?". It's a valid question that organizations should ask before an incident...

Penetration Testing - PCI Compliance - Auditing

See How We Can Secure Your Assets

Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.

 

tel: (877) 771-8911 | email: info@tcm-sec.com