We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Trimarc Joins TrustedSec: Strengthening Our Commitment to Security
Play We’re excited to share some big news: Trimarc Security is now fully operating under TrustedSec! This marks a significant step forward in our mission to…

Are Attackers "Passing Through" Your Azure App Proxy?
TL;DR - Azure app proxy pre-authentication set to Passthrough may unintentionally expose private network resources.Microsoft’s Azure app proxy allows for…

Abusing Windows Built-in VPN Providers
Some interesting things happen when you connect to a virtual private network (VPN). One that recently caught my interest is updates to the routing table.…

Security Noise - Episode 7.12
On this episode of the Security Noise Podcast, we talk about CactusCon in Arizona. We discuss memorable talks from the 2025 conference, CVEs, bug bounties, and…

Measuring the Success of Your Adversary Simulations
Adversary Simulations (“AdSim” or “Red Teams”) represent a serious commitment on the part of an organization. In the United States, AdSim engagements are…

Ask Me Anything: The Road to Purple Teaming - Evolution and Lessons Learned
Join Attack Simulation & Detection Practice Lead Megan Nilsen and Security Consultants Travis Steadman and Zach Bevilacqua to learn more about Purple Teaming…

The Hidden Trap in the PCI DSS SAQ A Changes
Implementing requirements 6.4.3 and 11.6.1, or using a WAF to protect against script-based attacks, to meet PCI SSC's new eligibility criterion for SAQ A…

A Threat Hunter’s Guide to Decoding the Cloud
This blog will guide you through how to be a successful threat hunter in cloud environments, along with some helpful tips and advice.

Security Noise - Episode 7.11
On this podcast, our experts talk about the legislation around TikTok in the United States, data security, and other types of Chinese technologies and IoT…

Exploring NTDS.dit – Part 1: Cracking the Surface with DIT Explorer
NTDS.dit is the file housing the data for Windows Active Directory (AD). In this blog post, I’ll be diving into how the file is organized. I’ll also be walking…

Getting Started Using LLMs in Application Testing With an MVP
Are you interested in incorporating Large Language Models (LLMs) into app tests yet lack the tooling to get you there? This blog walks through how to start…

2024 Conference Roundup
Join David Kennedy, Justin Elze, Jason Lang, and Oddvar Moe for firsthand accounts on the largest industry conferences in 2024, sharing key takeaways for 2025.
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
