What Is Ethical Hacking? A Comprehensive Guide
by Jake Dwares on April 2, 2024 at 1:45 PM
In today’s world, the pervasive threat of cyberattacks has illuminated a stark reality: no computer system is entirely immune to intrusion. This challenge has paradoxically ushered in the role of ethical hackers — cybersecurity professionals who employ their skills to fortify defenses …
Securing Your eCommerce Website From Hackers
by William DePalma on December 20, 2023 at 2:15 PM
In the bustling world of online retail, safeguarding your eCommerce website against cyber threats has become more crucial than ever. The 2022 Verizon Data Breach Report revealed that the retail sector experienced 629 incidents in that year, with 241 cases resulting in confirmed data d …
What is Flipper Zero? Portable Hacking “Multi-Tool” Explained
by Peter Fellini on August 24, 2023 at 1:00 PM
Wireless communication is integral to the modern world. Whether it is phones, Wi-Fi connectivity, or bank cards, these devices employ different types / wavelengths of wireless signals for their operations. Though infiltrating these signals traditionally demands a deep understanding of …
Penetration Testing: Understanding Red, Blue, & Purple Teams
by William DePalma on April 11, 2023 at 1:00 PM
Data breaches are growing more expensive by the day. The average cost of a data breach is projected to reach $5 million by the end of 2023, up from $4.35 million in 2022. Penetration testing, or pen testing, helps you uncover unknown vulnerabilities and compliance gaps within your org …
OWASP Top 10: Why Compliance to OWASP Matters
by Jake Dwares on November 10, 2022 at 1:00 PM
During a recent web application penetration test, my Compass IT Compliance colleague Jesse Roberts was quickly able to identify and exploit a coding vulnerability on a client’s public facing web portal. As part of the engagement, Jesse was initially granted “standard user” access to t …
Ignorance Is Not Bliss When It Comes to Security Assessments
by Kelly O’Brien on May 6, 2022 at 4:00 PM
It is no surprise that bad actors constantly seek to take advantage of current events and changing circumstances to exploit vulnerabilities and gaps in the security of organizations across a myriad of industry verticals and sizes.