We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

A LAPS(e) in Judgement
Building Splunk queries to detect LAPS (Local Administrator Password Solution) attacks using Windows Security Log events, enabling enhanced logging and…

TrustedSec Security Podcast - Episode 5.16
Episode - 5.16 - LastPass the Last Time Honest (Well Maybe)

To OOB, or Not to OOB?: Why Out-of-Band Communications are Essential for Incident Response
Establish a secure, temporary communication system for emergency situations, ensuring continuity and integrity during organization-wide incidents.

Building a Strong Foundation With the Information Security Accelerator
TrustedSec's Information Security Accelerator creates a tailored 12-18 month roadmap, practical guidance, and hands-on implementation to protect against 77% of…

TrustedSec Security Podcast - Episode 5.15
Episode - 5.15 - Quantum Malware and Your Passwords (again)

Security Lessons Learned from the Global Conflict
Learn from the front lines of the global conflict and discover how to keep ahead of the latest cyber-attacks and advances in security with TrustedSec experts.

More Active Directory for Script Kiddies
Learn how to easily exploit Active Directory for Script Kiddies, a guide to AD enumeration and hacking tools, with TrustedSec.

Looting iOS App's Cache.db
Extracting sensitive data from an iOS device's Cache.db file can be a challenging task, but it's not impossible.

Measuring the Impact of a Security Awareness Program
Measuring the impact of a security awareness program requires identifying key risks and human behaviors, then tracking metrics like Clean Desk and phishing…

TrustedSec Security Podcast - Episode 5.14
Episode - 5.14 - Nothing to See Here, Move Along

The Art of Bypassing Kerberoast Detections with Orpheus
Back in May of 2018, I wrote a blog post detailing the steps I took to detect Kerberoast (T1558.003) attacks. This research allowed us to help organizations…

Measuring Effectiveness With MITRE ATT&CK
Discover how to leverage the MITRE ATT&CK Framework to enhance your security program's effectiveness, with insights on aligning threat modeling and control…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
