blog

Our Latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Tools, Techniques & Processes: From Zero to Domain Administrator
Pentests

We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.

Leveraging Log4j Exploit to Domain Administrator
Pentests

We recently performed another internal network assessment with the goal to gain Domain Administrator access on the target network. We had unauthenticated access to the network, i.e. unauthorized user or an internal attacker onto the user LAN.

Bypassing Certificate Pinning with Frida on Android Device
Mobile pentests

Modern-day mobile applications implement additional levels of security controls that prevent an attacker from intercepting the content for the HTTPS connection. Such implementation won’t allow common proxy tools to intercept and log the application traffic.

Blacklock Achieves ISO 27001:2022 Certification
News, Events & Awards

We are thrilled to share an exciting milestone in Blacklock's journey towards providing unparalleled cybersecurity services. Our commitment to safeguarding your digital assets and data has always been our top priority.

Introducing Blacklock's On-Demand Vulnerability Scanning Service, Redefining Your Cybersecurity Approach
PTaaS

We are thrilled to announce the launch of Blacklock's vulnerability scanning now available as a service! This exciting development offers you the power of our industry-leading penetration testing platform right at your fingertips, providing an innovative, agile approach to cybersecurity.

Intersection of AI and Cybersecurity: Navigating the Risks
AI & Cybersecurity

The rise of artificial intelligence (AI) has brought about significant advancements in various industries, including cybersecurity. However, alongside these advancements, concerns about adversarial AI and its potential to pose a significant threat to cybersecurity have emerged.

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.