Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials
Crafting a Winning Cybersecurity Resume: 8 Tips and Tricks
Looking to land your first cybersecurity job? Check out our 8 tips for crafting a resume that will attract the attention of hiring managers.
How Much Does a Penetration Test Cost?
Many factors determine the final cost of a penetration test. TCM Security CEO Heath Adams walks through the many variables that determine the cost of a pentest.
How to Prepare for the PWPP Exam
Learn how to prepare for and pass the Practical Web Pentest Professional (PWPP) exam with these helpful tips from creator Alex Olsen.
Hacker Summer Camps for Kids: A Parent’s Guide
Are your kids interested in hacking and cybersecurity? Keep them engaged with summer camps that will nurture the next generation of cybersecurity professionals.
Getting Started with IoT & Hardware Hacking: Part One- Don’t Break the Bank
To start hardware hacking, you’ll need tools. Andrew Bellini shares his recommendations for essential IoT hardware hacking tools across multiple price points.
Burp Extensions: Singletons and Scope
Learn Burp Suite extension development with the new Montoya API: explore the power of the Singleton pattern, and restrict actions to in-scope requests only!
1st Annual TCM CTF Web Walkthroughs
Explore TCM Security’s first CTF event with MetaCTF: 3 challenges by Tib3rius & Alex Olsen, featuring XML, race conditions & PHP serialization.
Burp Extensions: GUI Design
Overview In part 4 of our series on creating extensions for Burp Suite using the Montoya API, we will learn about designing an interactive GUI for our extension. If you haven’t read the previous installments of this blog post series yet, we highly recommend you do...
Learn AppSec Testing in 2024
Unlock your AppSec career in 2024 with our expert guide. Master fundamentals, tools, and get real-world experience. Your path to success starts here!
Healthy Study Habits to Become a Pentester
The journey to becoming a Penetration Tester: Build focused study habits, manage time wisely, sleep well, and take effective notes for success.
Penetration Testing - PCI Compliance - Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.