Year in Review: M Square 2025 Wins & Lessons
Reflecting on M Square LLC's first year: what we accomplished, what we learned, and where we're headed in 2026.
61 posts from this period
Reflecting on M Square LLC's first year: what we accomplished, what we learned, and where we're headed in 2026.
Excited to announce I'll be presenting at DEF CON 32 on practical security for small businesses.
Introducing our blog—your resource for practical cybersecurity insights, tutorials, and industry perspectives.
The most common cybersecurity mistakes small and mid-sized businesses make—and practical steps to fix them without breaking your budget.
A practical guide to choosing between free and paid security tools for small and mid-sized businesses—what's worth the investment and where you can save.
A practical guide for executives on how to read and understand penetration test reports—what matters, what doesn't, and how to take action.
A practical guide to multi-factor authentication for SMBs—why it's essential, how to implement it, and how to get your team on board.
A step-by-step guide to building a penetration testing lab at home using entirely free tools—perfect for learning and practicing ethical hacking safely.
A practical guide to phishing attacks—what they are, real-world examples targeting SMBs, and how to defend your business against them.
A practical guide to training your team on password security—including diceware passphrases, real-world breach examples, and best practices.
A practical guide to security risk assessments for small and mid-sized businesses—what they are, what's involved, and why they matter.
Why your IT guy isn't a security expert—and why that's okay. Understanding the distinct roles of IT support and cybersecurity professionals.
A practical guide to HIPAA and GDPR compliance for small and mid-sized businesses—what they mean, what's required, and how cybersecurity fits in.
A practical week-long action plan for healthcare practices to improve security posture and move toward HIPAA compliance.
Full walkthrough of the Corporate machine on Hack The Box. Covers API exploitation, Active Directory lateral movement, and privilege escalation.
How to recognize the warning signs of a security breach and take immediate action to minimize damage.
Multi-factor authentication doesn't have to be confusing. Here's the simplest explanation of MFA and why it's essential for your business.
Deep dive into a phishing campaign targeting financial institutions. Infrastructure analysis, kit reverse engineering, and IOC extraction.
Advanced ffuf techniques for web application testing. Custom wordlists, filter strategies, and real-world fuzzing workflows.
A practical guide to ransomware—what it is, real-world examples, and how to prepare your SMB before an attack happens.
Network segmentation explained in plain English: why dividing your network into zones is essential for limiting breach damage.
A beginner-friendly guide to understanding and creating reverse shell payloads. Learn the fundamentals before diving into advanced exploitation.
A practical guide to creating essential cybersecurity policies for your business—even if you're starting from scratch.
How to think about cybersecurity as an investment that generates returns—and how to calculate the ROI for your business.
New training programs for 2025 including hands-on workshops, executive briefings, and customized security awareness programs.
The uncomfortable truth about SMB security: why attackers prefer small businesses and what you can do about it.
What cyber insurance underwriters actually evaluate and how to position your business for better coverage and lower premiums.
A practical security roadmap for startups: what to implement at each stage of growth without slowing down innovation.
How to secure a distributed workforce: practical tools, policies, and tactics for remote and hybrid teams.
A beginner-friendly walkthrough of the Hack The Box Laboratory machine, covering GitLab exploitation and privilege escalation.
An intermediate walkthrough covering Active Directory enumeration, Kerberoasting, and domain privilege escalation techniques.
A beginner walkthrough of TryHackMe's Basic Pentesting room, covering web enumeration, SMB exploitation, and Linux privilege escalation.
A walkthrough of the TryHackMe Blue room demonstrating the infamous EternalBlue (MS17-010) vulnerability exploitation.
A comprehensive review of TryHackMe's OWASP Top 10 room, covering each vulnerability category with practical examples.
How proactive security measures stopped a ransomware attack before it could spread through a mid-sized law firm.
Understanding the red team and blue team concepts and how small and medium businesses can benefit from both offensive and defensive security approaches.
Key takeaways from conducting HIPAA compliance audits and the most common gaps found in healthcare organizations.
Technical writeup of identifying and exploiting broken access control vulnerabilities in a legacy web application during a penetration test.
Exploring how AI and LLMs are being used in offensive security operations, from reconnaissance to payload development.
Master Burp Suite with techniques used by professional bug bounty hunters: from basic interception to advanced automation.
Create targeted wordlists for password attacks and content discovery using CeWL, Crunch, and other techniques.
Learn exploit development fundamentals by creating a simple buffer overflow exploit in Python, step by step.
Understanding DNS rebinding attacks: how they work, why they're dangerous, and how to demonstrate them in a lab environment.
A practical guide to the OWASP Top 10 vulnerabilities with real payloads and examples for each category.
Techniques for bypassing Web Application Firewalls during authorized penetration tests, with practical examples.
Learn about our free 30-minute security consultation and what you can expect from the conversation.
Announcing our Virtual CISO service—executive-level security leadership for businesses that need expertise without the full-time price tag.
The story behind M Square LLC: why I left corporate security to help small businesses protect themselves from cyber threats.
A practical guide to penetration testing—what it is, why it matters, and how it helps protect your business from real-world cyberattacks.
Why compliance-driven security creates a false sense of protection and what actually makes businesses secure.
Exploring how AI is changing offensive security: the tools emerging, how attackers use them, and the ethical considerations for defenders.
Where healthcare cybersecurity is headed and how medical practices should prepare for emerging threats and opportunities.
Security awareness training isn't working. Here's why the current approach fails and what actually changes behavior.
Building a security culture that makes your organization naturally resistant to attacks—beyond tools and training.
Learn how to deliver effective employee cybersecurity training that boosts your human firewall without slowing down your business. Practical strategies for engaging, bite-sized security awareness.
Learn how web fuzzing differs from traditional binary fuzzing, and how bug hunters use it to find IDORs, hidden endpoints, and logic flaws in web applications.
Learn the fundamentals of fuzzing—a powerful technique used by security researchers to find zero-day bugs and vulnerabilities through automated input testing.
A complete guide to the penetration testing process—from kickoff to final report. Learn what happens during a pentest and how to prepare your team.
How I integrate AI into every stage of my reconnaissance workflows as a penetration tester. Practical examples, tools, and techniques for red teamers and bug bounty hunters.
A ready-to-use cybersecurity policy template tailored for small businesses and lean teams. Includes implementation tips and best practices for protecting your digital operations.
Learn the fundamentals of reconnaissance in cybersecurity—what it is, why it matters, and how to perform it with free tools. Essential reading for SMBs, new security professionals, and curious tech teams.