Penetration Testing

Abusing Default Credentials

Attackers can exploit default credentials to escalate privileges within systems, endangering sensitive assets.

Internal Network Penetration Testing is typically done by organizations for compliance reasons, either for HIPAA or for PCI DSS Compliance. But regardless of why most companies invest in it, it’s an essential part of ensuring that your security controls are being managed effectively, and your sensitive data, protected.

HALOCK Security Labs’ (more…)

Weaponizing Legacy Software

Legacy software that uses web traffic can be used to blend in with other incoming and outgoing traffic.

There are a variety of ways to gain the access needed to remotely execute commands on a compromised machine. One way that HALOCK Security Team has been able to gain access during an Assumed Breach Penetration Test is by utilizing (more…)

Cyber Security Phishing Awareness Training

Phishing remains one of the most common corporate attack vectors, and with good reason. Phishing attacks are simple to create, easy to deploy and are often successful for cybercriminals.

Types Of Common Malware Attacks

Malware remains a massive security problem, costing companies billions each year to manage, mitigate and remediate. While the term itself is straightforward — malware refers to any software designed to cause harm on a system or device — there are a host of malware types and techniques used by attackers to circumvent defenses and compromise key systems.

(more…)

The Bank and Financial Sector under Siege Today


We all know it has been one heck of a year, one full of challenges at many levels. While we all contend with different types of threats across a variety of fronts, one threat that cannot be ignored is the tsunami of cyberattacks that have accelerated during the era of COVID. (more…)

Go to Top