Explore our latest blog posts and stay secure in a digital world.
Today, software is built and delivered faster than ever, but that speed has come with a cost. The integrity of the software supply chain is now one of the most actively targeted areas in cyber security.
Automated vulnerability revalidation with AI agents is changing how organisations maintain security assurance.
Cybersecurity has become a baseline expectation for doing business, and New Zealand businesses are part of that global reality. The Government Communications Security Bureau (GCSB)
Artificial intelligence initiatives, and particularly large language models (LLMs), are moving from research labs into production systems at unprecedented speed.
Often called the CKC or “the cyberattack lifecycle”, the Cyber Kill Chain is a strategic security model that chains the security vulnerabilities together to form a real-world exploit.
We are proud to announce that Blacklock Security has achieved CREST accreditation for our penetration testing services.
In today’s world, software is a part of everyday life, and spans almost all domains, with majorly built on third-party code and open-source software. Anyone who is concerned about better supporting their software products internally
We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.
Cross Site Request Forgery is one of the most happening attacks over the internet today. The attackers find it easy to exploit as it does not require any authentication information, session cookies but only require the user to be authenticated to the application. And this works on every platform.
Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!