We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Not in My Domain: Preparing for Your Next Penetration Test
In this webinar, our experts will dig into best practices and common issues they identified during recent penetration testing engagements, the latest attack…

Security Noise - Episode 7.14
On this episode of the Security Noise Podcast, we take a look at SOC teams and ways they can improve their threat detections, proactive measures, logging, and…

Kubernetes for Pentesters: Part 1
In the first section of this multi-part practical guide, I’ll introduce you to Kubernetes (K8s) from a penetration testing perspective, including basic…

CUI For the Rest of Us: The New Government-Wide CUI Protection Contract Clause
U.S. government contractors need to start preparing for a proposed new government-wide Controlled Unclassified Information (CUI) protection requirement.

MCP: An Introduction to Agentic Op Support
1.1 IntroductionAgents and Large Language Models (LLMs) offer a powerful combination for driving automation. In this post, we’ll explore how to implement…

Getting the Most Out of Your API Security Assessment
Tips for what you can do in advance of an API Security Assessment to help us avoid delays and ensure the process runs smoothly and benefits everyone.

Windows Client Privilege Escalation
Penetration testers and Red Teamers won't want to miss this webinar on Windows client privilege escalation where we discuss enumeration, tools, and techniques.

PCI DSS Payment Card Data Retention
The Payment Card Industry Data Security Standard (PCI DSS) applies to and has specific requirements for retention of Account Data. In general, organizations…

Security Noise - Episode 7.13
Business Email Compromise (BEC) attacks are becoming increasingly common and sophisticated. On this episode of the Security Noise Podcast, we discuss the…

Trimarc Joins TrustedSec: Strengthening Our Commitment to Security
Play We’re excited to share some big news: Trimarc Security is now fully operating under TrustedSec! This marks a significant step forward in our mission to…

Are Attackers "Passing Through" Your Azure App Proxy?
TL;DR - Azure app proxy pre-authentication set to Passthrough may unintentionally expose private network resources.Microsoft’s Azure app proxy allows for…

Abusing Windows Built-in VPN Providers
Some interesting things happen when you connect to a virtual private network (VPN). One that recently caught my interest is updates to the routing table.…

Not in My Domain: Preparing for Your Next Penetration Test
In this webinar, our experts will dig into best practices and common issues they identified during recent penetration testing engagements, the latest attack…

Security Noise - Episode 7.14
On this episode of the Security Noise Podcast, we take a look at SOC teams and ways they can improve their threat detections, proactive measures, logging, and…

Kubernetes for Pentesters: Part 1
In the first section of this multi-part practical guide, I’ll introduce you to Kubernetes (K8s) from a penetration testing perspective, including basic…

CUI For the Rest of Us: The New Government-Wide CUI Protection Contract Clause
U.S. government contractors need to start preparing for a proposed new government-wide Controlled Unclassified Information (CUI) protection requirement.

MCP: An Introduction to Agentic Op Support
1.1 IntroductionAgents and Large Language Models (LLMs) offer a powerful combination for driving automation. In this post, we’ll explore how to implement…

Getting the Most Out of Your API Security Assessment
Tips for what you can do in advance of an API Security Assessment to help us avoid delays and ensure the process runs smoothly and benefits everyone.

Windows Client Privilege Escalation
Penetration testers and Red Teamers won't want to miss this webinar on Windows client privilege escalation where we discuss enumeration, tools, and techniques.

PCI DSS Payment Card Data Retention
The Payment Card Industry Data Security Standard (PCI DSS) applies to and has specific requirements for retention of Account Data. In general, organizations…

Security Noise - Episode 7.13
Business Email Compromise (BEC) attacks are becoming increasingly common and sophisticated. On this episode of the Security Noise Podcast, we discuss the…

Trimarc Joins TrustedSec: Strengthening Our Commitment to Security
Play We’re excited to share some big news: Trimarc Security is now fully operating under TrustedSec! This marks a significant step forward in our mission to…

Are Attackers "Passing Through" Your Azure App Proxy?
TL;DR - Azure app proxy pre-authentication set to Passthrough may unintentionally expose private network resources.Microsoft’s Azure app proxy allows for…

Abusing Windows Built-in VPN Providers
Some interesting things happen when you connect to a virtual private network (VPN). One that recently caught my interest is updates to the routing table.…
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
