We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

From RAGs to Riches: Using LLMs and RAGs to Enhance Your Ops
1.1 IntroductionIn this blog, I will explore Retrieval-Augmented Generation (RAG) and how it can be applied to research capabilities. RAG is a framework…

Security Noise - Episode 7.10
Authentication in 2025

Operating Inside the Interpreted: Offensive Python
Discover how to use Python for malicious purposes on Windows, leveraging its ease of installation and existing tradecraft to evade detection and deploy malware…

Security Noise - Episode 7.9
On this episode of the Security Noise Podcast, we discuss user enumeration on Azure and "presence data" in Microsoft Teams with nyxgeek.

DOD Contract Compliance: DFARS 7012 and CMMC
Learn how to navigate DOD contract clauses and CMMC requirements for protecting FCI and CUI, and effectively implement compliance changes for your organization.

Command Line Underdog: WMIC in Action
My typical engagements are mostly Red Teams, so I do not often get a chance to play with terminal server application breakouts—but on a recent engagement, I…

Solving NIST Password Complexities: Guidance From a GRC Perspective
Understand NIST's Digital Identity Guidelines for secure password implementation and access control, ensuring risk-based authentication and minimizing breaches…

Security Noise - Episode 7.8
Customize your Linux group setup with our efficient and scalable solution, ensuring seamless integration with your system.

Malware Series: Process Injection Mapped Sections
This post explains a common malware technique using shared memory sections to inject and execute code in a remote process, demonstrating the process in C and…

The Lost Underground
Join Mike Felch on an eye-opening journey into the lost underground of cybersecurity, exploring its historical foundation, ideological divide, and lasting…

Top 10 Blogs of 2024
At TrustedSec, we are all about leveraging our collective intelligence and knowledge to uplift the cybersecurity community. One of our most popular educational…

Security Noise - Episode 7.7
Amazing Stories in InfoSec
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
