Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

79 results found for basic

79 results found for basic:

Basic Authentication Versus CSRF

I was recently involved in an engagement where access was controlled by Basic Authentication. One (1) of the findings I discovered was a Cross-Site Request Forgery (CSRF) vulnerability. The client was unsure of the best approach to prevent CSRF in…

https://trustedsec.com/blog/basic-authentication-versus-csrf

BEC Basics: Your First Step to Thwarting Email Scams

Learn to identify and combat business email compromise (BEC) threats in Microsoft 365 with expert Steven Erwin and Caroline Fenstermacher.

https://trustedsec.com/resources/webinars/bec-basics-your-first-step-to-thwarting-email-scams

Social Engineering Basics: How to Win Friends and Infiltrate Businesses

Understanding social engineering tactics and how to defend against physical breaches, with expert insights to enhance security awareness and employee education, from a renowned security expert, John Smith.

https://trustedsec.com/blog/social-engineering-basics-how-to-win-friends-and-infiltrate-businesses

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene

Assess and prioritize your cybersecurity posture with industry-proven best practices, including internal asset discovery, internet-exposed assets, baselining, and robust incident response planning.

https://trustedsec.com/blog/back-to-basics-the-trustedsec-guide-to-strong-cyber-hygiene

Cyber Security Interviews – #086 – Dave Kennedy: The Basics Are Still Challenging

Social-Engineer Toolkit (https://github.com/trustedsec/social-engineer-toolkit) (SET), Artillery, Unicorn, PenTesters Framework, and several popular open-source tools.

David was the co-founder of DerbyCon (https://en.wikipedia.org/wiki/DerbyCon) ;…

https://trustedsec.com/about-us/news/cyber-security-interviews-086-dave-kennedy-the-basics-are-still-challenging

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene—Part 2

In the first Back to Basics blog we discussed cyber hygiene and some fundamental security practices one can take to quickly assess their current cybersecurity posture and identify, prioritize, and mitigate visibility gaps. This post focuses on…

https://trustedsec.com/blog/back-to-basics-the-trustedsec-guide-to-strong-cyber-hygiene-part-2

Unleashing the Power of AppLocker: How to Get Started and Go Beyond the Basics

Learn how to build a powerful AppLocker policy, stopping ransomware and automated attacks, and identify weaknesses in your configuration with expert guidance.

https://trustedsec.com/resources/webinars/unleashing-the-power-of-applocker-how-to-get-started-and-go-beyond-the-basics

Artillery 0.2 Alpha has been released!

Artillery 0.2 Alpha released, adding basic Windows support with fake port creation, anti-dos prevention, and improved security testing tools.

https://trustedsec.com/blog/artillery-0-2-alpha-has-been-released

NPS PAYLOAD

NPS Payload will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources.

https://trustedsec.com/resources/tools/nps-payload

Developing with VBA for Script Kiddies

Master VBA: Unlock the Power of Visual Basic for Applications to Automate and Customize Microsoft Office Applications

https://trustedsec.com/blog/developing-with-vba-for-script-kiddies
1 2 3 4 Prev