Blog
Vishing – Phone-Based Phishing
Sherlocked Security – Vishing / Phone-Based Phishing Simulating Social Engineering...
Smishing – SMS Phishing
Sherlocked Security – Smishing / SMS Phishing Simulating SMS-Based Social...
Insider Threat Wargames
Sherlocked Security – Insider Threat Wargames Simulating Malicious Insider Attacks...
Deepfake Video Phishing
Sherlocked Security – Deepfake Video Phishing Simulating Realistic Deepfake Phishing...
Credential Stuffing & ATO Simulation
Sherlocked Security – Credential Stuffing & ATO Simulation Simulating Real-World...
AI-LLM Jailbreak Testing
Sherlocked Security – AI/LLM Jailbreak Testing Assessing AI & LLMs...
Automated SBOM Generation
Sherlocked Security – Automated SBOM Generation Generate, Manage, and Integrate...
CI-CD Pipeline Security (Build Test Deploy)
Sherlocked Security – CI/CD Pipeline Security (Build, Test, Deploy) Securing...
Container Image Hardening
Sherlocked Security – Container Image Hardening Minimize Attack Surface and...
DevSecOps Maturity Assessment
Sherlocked Security – DevSecOps Maturity Assessment Measure, Benchmark, and Advance...