blog

Our Latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Android Application Assessment – Part I...
September 25, 2024
Blacklock

Recently, I was engaged in testing an android application. The customer generously provided me his...

Android Application Assessment – Part II...
September 25, 2024
Blacklock

I hope my last post helped you to kick off android application pentest. In this post, I will cover...

Android Application Assessment – Part III...
September 25, 2024
Blacklock

This post covers some more android application specific attacks and tools which may further help y...

Utilizing Metasploit Database in Network Pentest...
September 25, 2024
Blacklock

What’s the first thing come to your mind when you think of doing network pentest of over 1000 IPs ...

Leveraging Log4j Exploit to Domain Administrator...
September 25, 2024
Blacklock

We recently performed another internal network assessment with the goal to gain Domain Administrat...

Bypassing Certificate Pinning with Frida on Andr...
September 25, 2024
Blacklock

Modern-day mobile applications implement additional levels of security controls that prevent an at...

Blacklock Achieves ISO 27001:2022 Certification...
September 25, 2024
Blacklock

We are thrilled to share an exciting milestone in Blacklock's journey towards providing unparallel...

Introducing Blacklock's On-Demand Vulnerability ...
September 25, 2024
Blacklock

We are thrilled to announce the launch of Blacklock's vulnerability scanning now available as a se...

Award win makes us part of an Innovation Nation...
September 25, 2024
Blacklock

Blacklock scooped the first trophy at the Reseller News Innovation Awards on May 25 in Auckland, r...

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.