Pentest Services for Your Audit and Compliance Requirements

McCormack Cyber Solutions offers comprehensive Penetration Testing, Vulnerability Management,  and Configuration Reviews to meet your audit and compliance needs. Our assessment reports will help you complete your HIPAA, PCI, and SOC2 requirements.  All MCS clients are granted access to our vulnerability dashboard, and can use it to track remediation status, ask for guidance, or just […]

AI Data Breaches are Growing! How Can You Protect Your Company?

Artificial intelligence (AI) is rapidly transforming industries. It offers businesses innovative solutions and automation capabilities. But with this progress comes a growing concern: AI data breaches. As AI becomes more integrated into our systems, the risks increase. The data it collects, analyzes, and utilizes becomes a target. A recent study on AI security breaches revealed […]

Phishing 2.0 How AI is amplifying the danger and what you can do

AI Enabled Phishing Is Here Phishing has always been a threat. Now, with AI, it’s more dangerous than ever. Phishing 2.0 is here. It’s smarter, more convincing, and harder to detect. Understanding this new threat is crucial. A recent study found a 60% increase in AI-driven phishing attacks. This is a wake-up call that phishing […]

Don’t Risk It! Why You Shouldn’t Skip Vulnerability Assessments

Cyber threats are a perpetual reality for business owners. Hackers are constantly innovating. They devise new ways to exploit vulnerabilities in computer systems and networks. For businesses of all sizes, a proactive approach to cybersecurity is essential. One of the most crucial elements of this approach is regular vulnerability assessments. A vulnerability assessment is a […]

BurpSuite Tips and Tricks

We love giving back to the community at MCS, and selfishly making notes for ourselves to reference later. This will be the start of a collection of Burp tips and tricks aimed primarily at beginners, but you may find a feature you didn’t know about even as a veteran user. If you have suggestions drop […]

Why Patch Management Is Not Enough

What is patch management and why is it important? There is a very high chance you, or your MSP, are providing patch management services. These are included in most IT management software suites and is an extremely important aspect of the overall vulnerability management lifecycle. Patch management is the process of applying updates to software […]

All Your Vulnerabilities In One Dashboard

McCormack Cyber Solutions recently made a strategic partnership with Plextrac to leverage their top-of-the-line penetration testing and vulnerability management reporting portal. With this platform we can now offer our clients access to a real time dashboard to ingest all of their Vulnerability Management, Cloud Security Configuration Review, Vulnerability Assessment, and Penetration Test findings and recommendations […]

Analytics Gone Wild

We recently encountered a fun interaction between an analytics solution and protections from Cloudflare. This isn’t a particularly likely or impactful issue, but it is certainly an annoyance. Creating a session based DOS with analytics cookies? Ever wondered if you could take advantage of those tasty tracking cookies everyone uses for various purposes? So many […]

Looking to Start or Augment Your Vulnerability Management?

Learn how to identify and prioritize the cyber risks that threaten your business and how to mitigate them effectively with our vulnerability assessment programs.  What is Vulnerability Management?   Vulnerability management is the process of identifying, assessing, and addressing the vulnerabilities that exist in your IT systems, networks, and applications. Vulnerabilities are weaknesses or flaws […]

What Makes a Successful Pentest?

What are the components of a pentest? Let’s start this off with the basics. What are the major components of a pentest? Well, we know that a pentest is used to provide a security assessment of the controls in place for an application or network environment. Additionally, these tests will help in identifying potential security […]