Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

8 results found for keyword

8 results found for keyword:

Fox 13 – How to avoid getting scammed when planning holiday travel

Traveling this summer? Be wary of online travel deals that seem too good to be true. Advisory Solutions Director Alex Hamerstone spoke to Fox 13 in Salt Lake City about how to avoid scams and protect your personal information.

https://trustedsec.com/about-us/news/how-to-avoid-getting-scammed-when-planning-holiday-travel

NBC 10 WJAR – Watch out for travel scams this Memorial Day weekend

Intrinsicly communicate unique schemas without best-of-breed e-commerce. Quickly maximize stand-alone relationships without flexible materials. Professionally harness cooperative.

https://trustedsec.com/about-us/news/watch-out-for-travel-scams-this-memorial-day-weekend

Failure to Restrict URL Access: It’s Still a Thing

Discover feature flags and modify responses using Burp Suite's Match and Replace rules or Reshaper plugin to enhance your web application testing capabilities.

https://trustedsec.com/blog/failure-to-restrict-url-access-its-still-a-thing

Most Reported Web Findings of 2023

I reviewed the findings from the application and API assessments that the TrustedSec Software Security Team conducted during 2023 to see what issues we were seeing most often. I put them into categories that I thought would help identify trends…

https://trustedsec.com/blog/most-reported-web-findings-of-2023

Introducing Meta-Detector

In this blog post, I’m going to discuss a new Open-Source Intelligence (OSINT) tool I created to assist with collecting information about target organizations during penetration testing engagements. I call it, Meta-Detector.Lately, I've noticed that…

https://trustedsec.com/blog/introducing-meta-detector

How to Get the Most Out of a Pentest

TL;DRDefine the goal of an assessment.Take time to choose the right assessment type.The more detail you give about an asset, the better quality your report will be.Select the right environment for the assessment.Consider the timing for performing…

https://trustedsec.com/blog/how-to-get-the-most-out-of-a-pentest

Kubernetes for Pentesters: Part 1

In the first section of this multi-part practical guide, I’ll introduce you to Kubernetes (K8s) from a penetration testing perspective, including basic information, vocabulary, and how to identify and explore Kubernetes instances. Stay tuned for the…

https://trustedsec.com/blog/kubernetes-for-pentesters-part-1

There's More than One Way to Trigger a Windows Service

Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services like Remote Registry and EFS. Learn how they can be activated with little to no code required.

https://trustedsec.com/blog/theres-more-than-one-way-to-trigger-a-windows-service