🌐
TCM Security
tcm-sec.com › home › blog
Blog - TCM Security
May 14, 2025 - The TCM Security blog is your go-to resource for the latest news on cybersecurity threats and vulnerabilities, ethical hacking tips, and career advice.
🌐
TCM Security
certifications.tcm-sec.com › home › free resources
Free Resources - TCM Security
December 6, 2025 - The TCM Security blog is your one stop shop for helpful career advice, fun projects to help you learn by doing, and interesting technical writeups.
Discussions

TCM Security
None of these courses are going to teach you how to find a bug, it is all about the common types of bugs and how these can be applied on a lab environment. You can get the info for free from OWASP, Portswigger, YouTube.... More on reddit.com
🌐 r/bugbounty
17
13
July 29, 2024
Opinions on tcm security
Instead of posting this over an over in different subs you should learn how to crosspost. Also, if you would have done a simple reddit search you would find a lot of posts about people recommending TCM and probably found more subs. Don't be lazy, search before you post. More on reddit.com
🌐 r/AskNetsec
8
1
February 24, 2025
🌐
TCM Security
tcm-sec.com › home
Cybersecurity Consulting & Training - TCM Security
May 7, 2025 - In November we hosted an AI Hacking CTF Challenge as part of TCM’s annual Black Friday Sale. The challenge was straightforward: convince the chatbot to reveal the secret code that it knew, but was instructed to keep secret. For some contestants it was simple, they had... read more ... Introduction Earlier this year I published an OWASP Top 10 2025 prediction blog where I pulled CVE data from 2021 and made data driven predictions on where the new top 10 list will land.
🌐
AccessCyber
accesscyber.co › blog › tag › TCM+Security
TCM Security — AccessCyber — AccessCyber
From python to penetration testing, Heath Adams and the team at TCM Security are redefining how the security industry thinks about training and certifications.
🌐
X
x.com › TCMSecurity › highlights
Highlights by TCM Security (@TCMSecurity) / X
February 6, 2019 - 𝗡𝗼𝘁 𝗮𝗻 𝗔𝗽𝗿𝗶𝗹 𝗙𝗼𝗼𝗹𝘀 𝗝𝗼𝗸𝗲: Our new swag store has launched ... and did you know that the first 50 purchases get $50 off any TCMS certification? Act fast before the promo closes April 5th.
🌐
TCM Security
tcm-sec.com › home › iot and hardware hacking › getting started with iot and hardware hacking: part 2 – all about uart
Get Started with Hardware Hacking & UART - TCM Security
August 2, 2024 - Customized security solutions to meet your unique challenges and compliance needs. ... Next up in our series on getting started with hardware hacking, we dive into UART connections and even grab a shell on our Raspberry Pi device. This blog is part 2 in the series “Getting Started with IoT and Hardware Hacking.” In part 1, we covered some core fundamentals and how to build an affordable toolkit of IoT and hardware hacking gear.
🌐
TCM Security
tcm-sec.com › home › penetration testing › four must-haves for effective penetration testing
4 Tips to Make the Most of Your Pentest - TCM Security
September 8, 2025 - In short, the goal is to leave ... to secure their systems without trade secrets getting in the way. If you require excellent penetration testing services, TCM is a professional outfit with a long line of exceptional results and satisfied customers. Contact us about a consultation today! Disclaimer: This blog post is for ...
Find elsewhere
🌐
syselement
blog.syselement.com › home › courses-notes › tcmsecurity
TCM Security | syselement's Blog
December 18, 2025 - 🏠 Home BlogXGitHub📚 Buy Me a Book📧 Contact · More · 🏠Home · 🔳Operating Systems · 🐧Linux · 🪟Windows · 📝Courses Notes · eLearnSecurity / INE · Practical Networking · TCM Security · Linux101 · MAPT · PEH · 🖥️Cyber Everything ·
🌐
TCM Security
tcm-sec.com › home › penetration testing › guide to modern penetration testing infrastructure
Guide to Modern Penetration Testing Infrastructure - TCM Security
July 9, 2025 - In this blog TCM’s pentest lead Aaron Wilson will cover the hardware, software, report templates, and other infrastructure considerations that make a pentest firm run smoothly.
🌐
TCM Security
tcm-sec.com › home › security › the penny, the match, and the camera – osint
The Penny, the Match, and the Camera – OSINT - TCM Security
October 24, 2024 - In this blog post, we discuss some tradecrafts and techniques used by investigators and penetration testers in OSINT operations.
🌐
syselement
blog.syselement.com › tcm
TCM Security Academy Notes | TCM Security Academy Notes - by syselement
February 28, 2025 - 🏠syselement's Blog HomePowered by GitBook · On this page · Edit · academy.tcm-sec.com - © TCM Security · Linux 101 by Brent Eskridge · Mobile Application Penetration Testing by Aaron Wilson · Practical Ethical Hacking by Heath Adams · NextTCM - Linux 101 ·
🌐
TCM Security
tcm-sec.com › home › web applications › application security 101: basics, best practices, & challenges
Application Security: Basics & Best Practices - TCM Security
November 6, 2024 - In November we hosted an AI Hacking CTF Challenge as part of TCM’s annual Black Friday Sale. The challenge was straightforward: convince the chatbot to reveal the secret code that it knew, but was instructed to keep secret. For some contestants it was simple, they had... read more ... Introduction Earlier this year I published an OWASP Top 10 2025 prediction blog where I pulled CVE data from 2021 and made data driven predictions on where the new top 10 list will land.
🌐
TCM Security
tcm-sec.com › home › penetration testing › pentest tales #001: you spent how much on security?
You Spent How Much on Security? - TCM Security
September 11, 2025 - Pentest Tales is a blog series that walks through real-world pentests we've performed in the past. Domain administrators can learn how to secure their domains.
🌐
TCM Security
tcm-sec.com › home › penetration testing › pentest tales #002: digging deep​
#Pentest Tales #002: Digging Deep​ - TCM Security
September 11, 2025 - Welcome to the second edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past.
🌐
LinkedIn
linkedin.com › in › heathadams
Heath Adams - Breach Point | LinkedIn
February 19, 2026 - They see it as an opportunity to: 🔒 Strengthen security with shorter exposure windows ⚡ Automate #CLM at scale, eliminating human error and fire drills 📈 Build crypto-agility to prepare for #PQC and future cryptography transitions The 47-day mandate isn’t the end of flexibility - it’s the start of true crypto-agility. The companies that adapt now will leapfrog their competitors for years to come. Read the full blog 👉 https://lnkd.in/gvY6wRem
🌐
TCM Security
tcm-sec.com › home › career advice › how to be an ethical hacker in 2025
How to Be an Ethical Hacker in 2025 - TCM Security
October 28, 2024 - Customized security solutions to meet your unique challenges and compliance needs. ... Learn more about the topics, skills, and tools you should learn if you are interested in becoming an ethical hacker or penetration tester in 2025. For the past several years, we’ve posted annual blogs on how to become an ethical hacker.