Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials
How to Pass the PNPT Exam First Time
Alex Olsen shares his advice for how to pass the PNPT exam. Discover essential courses, study tips, and exam tactics for aspiring pentesters.
Programming with AI: Mini Course
Learn to code with AI: Enhance your skills with our beginner-friendly course on best practices, prompt engineering, and efficient development.
Avoid “OR 1=1” in SQL Injections
Discover the potential risks associated with “OR 1=1” SQL injections in cybersecurity assessments and why we should always be cautious when using it.
Burp Extension Dev Part 1: Setup & Basics
Learn Burp Suite extension development with the new Montoya API: Set up your dev environment and create custom Burp features!
The Practical Web Pentest Associate (PWPA) Exam
Gain practical skills in web app penetration testing with the PWPA certification, designed for beginners and experienced testers.
A Beginner’s Guide to JSON
JSON, the go-to for data interchange, thrives due to its simplicity. It bridges servers and clients, ensuring seamless data exchange in modern web apps.
How to Start Capture the Flag (CTF)
CTFs offer hands-on cybersecurity experience, enhancing troubleshooting skills, tech proficiency, and competitive prowess in a safe environment.
BURP Suite Macros: A Hands-On Guide
Learn to use BURP Suite macros to improve your workflow. Includes labs with CSRF tokens, Mass Assignment attacks, walkthroughs and challenges!
Protecting Yourself: Privacy, OSINT, and the Dark Web
Explore essential digital security topics, from the mysteries of the dark web to daily online hygiene habits. Empower yourself in an interconnected world.
Password Managers and Guidelines: Mastering Your Passwords
Explore how NIST guidelines and password managers modernize password security, making the task of managing multiple online accounts secure and user-friendly.
Penetration Testing - PCI Compliance - Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.