Explore our latest blog posts and stay secure in a digital world.
We are thrilled to share an exciting milestone in Blacklock's journey towards providing unparalleled cybersecurity services. Our commitment to safeguarding your digital assets and data has always been our top priority.
We are thrilled to announce the launch of Blacklock's vulnerability scanning now available as a service! This exciting development offers you the power of our industry-leading penetration testing platform right at your fingertips, providing an innovative, agile approach to cybersecurity.
The rise of artificial intelligence (AI) has brought about significant advancements in various industries, including cybersecurity. However, alongside these advancements, concerns about adversarial AI and its potential to pose a significant threat to cybersecurity have emerged.
Blacklock scooped the first trophy at the Reseller News Innovation Awards on May 25 in Auckland, recognising Blacklock’s efforts to improve automation and lower costs in the cyber security industry.
The rapid move towards digitization has significantly increased cybersecurity challenges. Cyberattacks are increasing everyday, resulting in a greater need for continuous security testing. Traditional pentesting is not equipped for this as it’s manual, lengthy and a point in time assessment.
At Blacklock, we're always looking for new ways to simplify and deliver the best solutions for our customers. With this in mind, we’ve recently released some significant upgrades to our offerings, after listening to your feedback and support.
We have had a couple of penetration test engagements that involved GraphQL endpoints. At first, it looked complex and we sketched out the methodology and approach to perform the penetration test. Here’s how it went,
Modern-day mobile applications implement additional levels of security controls that prevent an attacker from intercepting the content for the HTTPS connection. Such implementation won’t allow common proxy tools to intercept and log the application traffic.
We recently performed another internal network assessment with the goal to gain Domain Administrator access on the target network. We had unauthenticated access to the network, i.e. unauthorized user or an internal attacker onto the user LAN.
Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!