Explore our latest blog posts and stay secure in a digital world.
Often called the CKC or “the cyberattack lifecycle”, the Cyber Kill Chain is a strategic security model that chains the security vulnerabilities together to form a real-world exploit.
We are proud to announce that Blacklock Security has achieved CREST accreditation for our penetration testing services.
In today’s world, software is a part of everyday life, and spans almost all domains, with majorly built on third-party code and open-source software. Anyone who is concerned about better supporting their software products internally
We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.
Cross Site Request Forgery is one of the most happening attacks over the internet today. The attackers find it easy to exploit as it does not require any authentication information, session cookies but only require the user to be authenticated to the application. And this works on every platform.
Pentesting thick client applications is not a new concept instead the techniques adopted are new and interesting. I’m a bit lazy on explaining what thick client apps are, please refer here for more info. GTalk, Pidgin, Skype, MSN are few examples of thick client applications.
Wondering what DAST is and how it can help in identifying vulnerabilities? Well, you have landed on the right page.
We are excited to announce that Blacklock has joined NVIDIA Inception, a program designed to empower and...
We are thrilled to announce that Blacklock Security has been officially approved as a supplier in the...
Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!