Browse our blogs
We cover it all in The Security Blog. Discover what you’ve been looking for.

More Options for Response Modification -With ResponseTinker
Modifying server responses with ResponseTinker, a flexible Ruby-based extension for Burp Suite, to inject debugging and modify JavaScript files.

Yes, It’s Time for a Security Gap Assessment
For many organizations, rapidly implementing work-from-home initiatives over the past year due to the COVID-19 pandemic required quickly rolling out new…

TrustedSec Incident Response Team Slack AMA 02.17.2021
TrustedSec's Incident Response Team shares expertise on cloud IR, threat hunting, and more, helping organizations improve their security posture through…

TrustedSec Moves Headquarters to Fairlawn
TrustedSec, a renowned cybersecurity company, moves its headquarters to Fairlawn, Ohio, offering elite hacking services, training, and consulting to Fortune…

New Service Launched in Response to Hafnium Attacks
TrustedSec's Microsoft Exchange Incident Response Emergency Analysis: Quickly assess compromised servers for Hafnium attack damage, extract forensic data, and…

TrustedSec Approved as a CMMC Registered Provider Organization!
TrustedSec, a CMMC-AB-approved Registered Provider Organization, enhances security maturity for Defense Industrial Base organizations, offering expert advice…

CMMC Small Business Funding Roundup
Rick Yocum, expert in CMMC Readiness Review Program Assessment & Compliance, shares resources to help small businesses offset CMMC costs through grants,…

COFFLoader: Building your own in memory loader or how to run BOFs
Create a generic in-memory loader for various executable file formats, including COFF, ELF, Mach-O, and PE, with built-in beacon compatibility.

Who Left the Backdoor Open? Using Startupinfo for the Win
Windows 10 VM compromised using PowerShell Empire for advanced forensic analysis and detection of IoCs, leveraging startupinfo.xml files to identify…

Front, Validate, and Redirect
Use AzureC2Relay to securely relay Cobalt Strike beacon traffic to a team server within a virtual network, exposing only Secure Shell (SSH).

Group Policy for Script Kiddies
Learn how Group Policy can be both a powerful tool for sysadmins and a source of information for attackers, with techniques to exploit vulnerabilities and gain…

Injecting Rogue DNS Records Using DHCP
Understanding DHCP to Inject Rogue DNS Records via Spoofed MAC Addresses.
Loading...
