Explore our latest blog posts and stay secure in a digital world.
We recently performed another internal network assessment with the goal to gain Domain Administrator access on the target network. We had unauthenticated access to the network, i.e. unauthorized user or an internal attacker onto the user LAN.
We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.
Purple Teams, cables and continuous assurance; CHCon took place on November 5-6 in Christchurch in the historic Main Hall at the Arts Centre heritage site. Blacklock was proud to be a Bronze sponsor.
Agile methodologies in software development have accelerated in recent years, helping businesses provide value to customers much faster. This approach takes an interactive approach to software development, where products are developed in small iterations throughout the entire process.
Digitalisation has made many businesses adopt new technologies at an ever-increasing rate. The change to agile approaches has been central to all this, as they enable businesses to solve solutions much faster. But one area that hasn't kept up is penetration (security) testing, as it remains costly, inefficient, and complex. With a correlated rise of malicious cyberattacks, many businesses are at risk of financial and data losses that can leave severe and lasting impacts.
With the ability to draw fresh ideas from large crowds, save costs and generate brand awareness, it’s easy to see the attractiveness of crowdsourcing. But it can always leave you wide open to more failure and generate unprecedented turbulence, especially around intellectual property, cross-border data sharing and work quality. With the increased likelihood of such threats, crowdsourcing can be a questionable choice.
The correlation between the rise of online businesses and cyber-attacks is no coincidence. With nearly 1 cyber-attack happening every 39 seconds, every business is at risk. Unfortunately, many of them are underprepared because traditional penetration testing is costly, lengthy and complicated.
A quick blog post and reference guide to setup and getting started with Android application penetration testing.
What’s the first thing come to your mind when you think of doing network pentest of over 1000 IPs in couple of weeks? Is it really possible? Answer is YES!!!
Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!