TrustedSec Profile Banner
TrustedSec Profile
TrustedSec

@TrustedSec

Followers
77K
Following
3K
Media
1K
Statuses
5K

End-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #Hacktheplanet Blogs, news, webinars, and tools!

Fairlawn, Ohio
Joined November 2011
Don't wanna be here? Send us removal request.
@TrustedSec
TrustedSec
2 months
TrustedSec was founded on the core values of doing the right thing and delivering the best quality services. Today, that vision drives more than 100 passionate cybersecurity professionals united by a common goal — to make the world a more secure place.
2
8
48
@TrustedSec
TrustedSec
3 days
Thank you for being part of the TrustedSec community 🎁 From all of us at TrustedSec, have a safe, secure, and happy holiday season!
0
3
13
@TrustedSec
TrustedSec
5 days
Join us for our next webinar "Tips for #IR Planning: Prepare Before Crisis Strikes" on January 14! Thomas Millar and Shane Hartman will guide you through essential steps for Incident Response policy, plans, procedures, and instructions. Register now! https://t.co/7xSsv6pxa5
0
3
4
@TrustedSec
TrustedSec
6 days
Got some downtime over the holidays? It’s a great time to catch up on #SecurityNoise 🎧 Binge our latest episodes on our site or queue up our full YouTube playlist and start listening! https://t.co/2KpsFpiASl https://t.co/nth9vOGoWF
1
6
14
@WWHackinFest
Wild West Hackin' Fest
6 days
We would like to thank @TrustedSec for being a Copper Sponsor for Wild West Hackin' Fest @ Mile High 2026! We are very grateful for your support! Be sure to check out all their services here: https://t.co/05iMj03TsW #WWHF #MileHigh2026
1
3
10
@TrustedSec
TrustedSec
9 days
Our people are our most important asset. That’s why we hire the cybersecurity industry’s top-tier talent and focus on ethical character that aligns with our core values. Learn what it's like to work at TrustedSec and view job openings on our website: https://t.co/C2q3Lx61qJ
0
5
26
@TrustedSec
TrustedSec
10 days
The growing accessibility of AI tools is changing how easily realistic fake images can be created. @infosecdoc joined @WEWS to discuss a recent “AI prank” at an Ohio restaurant and what it signals for law enforcement. Watch now! https://t.co/oA5vp3h19P
Tweet card summary image
news5cleveland.com
Two Elyria restaurant employees are now facing criminal charges after police said they used artificial intelligence to make it look like the business was being robbed.
0
2
3
@TrustedSec
TrustedSec
10 days
Just because software can live on a Domain Controller doesn’t mean it belongs there. In this blog, Scott Blake offers a practical guide to understanding the risks and asking the right questions before expanding your Tier 0 attack surface. Read now! https://t.co/v2BqNN7qE4
Tweet card summary image
trustedsec.com
1
20
114
@TrustedSec
TrustedSec
11 days
Yesterday’s post wasn’t the only opportunity! We're looking for a seasoned Security Consultant to join our #IR team. Can you step into active incidents with confidence, operate independently, and deliver high-impact results for our clients? Apply below 👇 https://t.co/nA1LwSJeql
1
8
14
@TrustedSec
TrustedSec
12 days
New year, new job? We're hiring! TrustedSec is looking to hire a Security Consultant for the Hardening and Remediation team, providing hands-on Security Engineering support focused on cloud security, hardening, and remediation. Apply below! #infosecjobs https://t.co/xnCaypOlp9
1
8
23
@TrustedSec
TrustedSec
12 days
Did your favorite make the list? Comment below if you have an honorable mention!
0
0
3
@TrustedSec
TrustedSec
12 days
And our #1 blog of the year is... Kubernetes for Pentesters: Part 1 by Kelsey Segrue https://t.co/K2JeXGHJ4x
Tweet card summary image
trustedsec.com
1
0
6
@TrustedSec
TrustedSec
12 days
2. Red Team Gold: Extracting Credentials from MDT Shares by @Oddvarmoe
Tweet card summary image
trustedsec.com
1
0
2
@TrustedSec
TrustedSec
12 days
3. Hack-cessibility: When DLL Hijacks Meet Windows Helpers by @Oddvarmoe
Tweet card summary image
trustedsec.com
1
0
2
@TrustedSec
TrustedSec
12 days
5. WSUS Is SUS: NTLM Relay Attacks in Plain Sight by @Coontzy1
Tweet card summary image
trustedsec.com
1
0
3
@TrustedSec
TrustedSec
12 days
6. MCP: An Introduction to Agentic Op Support by @__mez0__
Tweet card summary image
trustedsec.com
1
0
3
@TrustedSec
TrustedSec
12 days
7. Command Line Underdog: WMIC in Action by @Oddvarmoe
Tweet card summary image
trustedsec.com
1
0
3
@TrustedSec
TrustedSec
12 days
8. Detecting Active Directory Password-Spraying with a Honeypot Account by @PyroTek3
Tweet card summary image
trustedsec.com
1
3
8
@TrustedSec
TrustedSec
12 days
9. CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe by @Oddvarmoe
Tweet card summary image
trustedsec.com
1
0
2