blog

Our Latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Understanding OWASP A08:2021 and How to Reduce Software Integrity Failures
November 27, 2025
Blacklock

Today, software is built and delivered faster than ever, but that speed has come with a cost. The integrity of the software supply chain is now one of the most actively targeted areas in cyber security.

Automated Security Validation With Agentic AI
November 20, 2025
Blacklock

Automated vulnerability revalidation with AI agents is changing how organisations maintain security assurance.

From OWASP to NZISM: Navigating Security Standards in New Zealand
October 2, 2025
Blacklock

Cybersecurity has become a baseline expectation for doing business, and New Zealand businesses are part of that global reality. The Government Communications Security Bureau (GCSB)

OWASP Top 10 LLM Risks and Their Impact on Businesses
September 26, 2025
Blacklock

Artificial intelligence initiatives, and particularly large language models (LLMs), are moving from research labs into production systems at unprecedented speed.

Blacklock Vulnerability Kill Chain Analysis
Breaking the Chain: How the Vulnerability Kill Chain Helps Businesses Prioritise and Remediate Security Risks Faster?
September 4, 2025
Blacklock

Often called the CKC or “the cyberattack lifecycle”, the Cyber Kill Chain is a strategic security model that chains the security vulnerabilities together to form a real-world exploit.

Blacklock Security Achieves CREST Accreditation
September 4, 2025
Blacklock

We are proud to announce that Blacklock Security has achieved CREST accreditation for our penetration testing services.

Guide to SBOM: What It Is and Why It Matters?
September 4, 2025
Blacklock

In today’s world, software is a part of everyday life, and spans almost all domains, with majorly built on third-party code and open-source software. Anyone who is concerned about better supporting their software products internally

Tools, Techniques & Processes: From Zero to Domain Administrator
July 1, 2025
Blacklock

We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.

.NET Inherent Protection against CSRF
April 17, 2025
Blacklock

Cross Site Request Forgery is one of the most happening attacks over the internet today. The attackers find it easy to exploit as it does not require any authentication information, session cookies but only require the user to be authenticated to the application. And this works on every platform.

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.