Explore our latest blog posts and stay secure in a digital world.
We recently performed another internal network assessment with the goal to gain Domain Administrator access on the target network. We had unauthenticated access to the network, i.e. unauthorized user or an internal attacker onto the user LAN.
Modern-day mobile applications implement additional levels of security controls that prevent an attacker from intercepting the content for the HTTPS connection. Such implementation won’t allow common proxy tools to intercept and log the application traffic.
We are thrilled to share an exciting milestone in Blacklock's journey towards providing unparalleled cybersecurity services. Our commitment to safeguarding your digital assets and data has always been our top priority.
We are thrilled to announce the launch of Blacklock's vulnerability scanning now available as a service! This exciting development offers you the power of our industry-leading penetration testing platform right at your fingertips, providing an innovative, agile approach to cybersecurity.
The rise of artificial intelligence (AI) has brought about significant advancements in various industries, including cybersecurity. However, alongside these advancements, concerns about adversarial AI and its potential to pose a significant threat to cybersecurity have emerged.
Blacklock scooped the first trophy at the Reseller News Innovation Awards on May 25 in Auckland, recognising Blacklock’s efforts to improve automation and lower costs in the cyber security industry.
Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!