We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Discovering a Deserialization Vulnerability in LINQPad
Discovering a Deserialization Vulnerability in LINQPad, written by James Williams, reveals a novel deserialization vulnerability in a.NET application with over…

A 5-Minute Guide to HTTP Response Codes
If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Navigating Compliance: FCI and CUI Requirements for Federal Contractors
TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for…

Security Noise - Episode 7.6
Ghost in The Machine: Hardware Hacking w/ Rob Simon

Attacking JWT with Self-Signed Claims
Understanding JWS vulnerabilities and how to exploit them is crucial for securing applications and APIs that use JSON Web Tokens (JWTs).

EKUwu: Not just another AD CS ESC
Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…

Ask Me Anything: Mobile Security
Expert panel shares latest mobile testing techniques, vulnerabilities, and strategies to secure mobile apps from sophisticated threats, protecting your mobile…

Detecting CVE-2020-0688 Remote Code Execution Vulnerability on Microsoft Exchange Server
Exploiting Indicators of Compromise: Understanding SYSMON, IIS Logs, and Process Execution for Enhanced Security.

Security Noise - Episode 7.5
Customize your Linux system with our unique features and advanced security solutions, built by our team of experts.

Ask Me Anything: Advanced Cloud Pen Testing Scenarios
Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and…

Android Hacking for Beginners
Bypass Android security measures to access sensitive data and transfer funds with this step-by-step guide to exploiting vulnerabilities in the Damn Vulnerable…

Offensively Groovy
On a recent red team engagement, I was able to compromise the Jenkins admin user via retrieving the necessary components and decrypting credentials.xml. From…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
