Skip to Main Content

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
Blog February 15 2024

Hardware Hacking: Plunder With a Bus Pirate

For this blog, I'm going to assume you have a Bus Pirate, you are able to access its terminal, and you are ready to use it—but what are you going to use it on?…

Read about this article
Blog February 13 2024

Offensive Lab Environments (Without the Suck)

WhatHave you ever been in an engagement where you need to test an evasive payload or technique, but you lack the time or resources to spin up a replica lab…

Read about this article
Blog February 08 2024

Content Security Policy: Mitigating Web Vulnerabilities by Controlling the Rules of the Game

Defining a Content Security Policy (CSP) for your web application can significantly harden it against XSS attacks, packet sniffing, and clickjacking, while…

Read about this article
Blog February 06 2024

A Beginner’s Guide to Mobile Application Testing

As consumers become more dependent on mobile devices, the need for application security has become more of a priority. In this blog post, I will discuss my…

Read about this article
Blog February 01 2024

The Rising Threat: A Surge in Zero-Day Exploits

IntroductionThe cat-and-mouse game between defenders and attackers continues to escalate in the ever-evolving cybersecurity landscape. Advanced Persistent…

Read about this article
Blog January 30 2024

Burrowing a Hollow in a DLL to Hide

1    Burrowing a Hollow in a DLL to Hide In this post about common malware techniques, we are still talking about hollowing—but this time, instead of hollowing…

Read about this article
Blog January 25 2024

From Zero to Purple

Learn how to create and deploy Internet Shortcut files for adversary emulation and detection engineering using Python, SMB, and WebDAV servers, a useful tool…

Read about this article
Blog January 23 2024

ProxyHelper2: The Sequel

ProxyHelper2 for Mark VII Pineapples allows device traffic to be forcibly routed into Burp Suite Proxy, intercepting traffic for Android applications.

Read about this article
Blog January 18 2024

Engagement Guide: How to Prepare for Your Purple Team

TrustedSec's Purple Team engagements prepare clients for security assessments by identifying gaps in security coverage, logging, and tooling, with offerings…

Read about this article
Blog January 16 2024

Level Up Your Reporting

Improve assessment report quality with a consistent template, clear evidence, and user-friendly annotations, enhancing collaboration and understanding among…

Read about this article
Blog January 09 2024

Detection Alchemy - The Purple Team Way

1.1      IntroductionAs security practitioners, we frequently extol the virtues of penetration testing and red team exercises as a way of identifying issues…

Read about this article
Blog December 21 2023

Regex Cheat Sheet

Master regex with Regex101, a comprehensive resource for testing and learning regex patterns, and reinforce your skills with a regex crossword puzzle.

Read about this article

Loading...