BlackHorse supports Offensive and Defensive Cyber Operations with leading edge technical innovations, mission automation solutions, cyber threat intelligence, and advanced cyber threat hunting and incident response. We have deployed quick reaction capability (QRC) efforts and tools, architected and integrated frameworks and capabilities, and performed vulnerability research to identify potential exploitable conditions and develop mitigations for a wide range of platforms.

Full Spectrum Support to Offensive Cyber Operations

Our cyber warfare solutions are designed and developed to support the full spectrum of cyber operations, readiness, and capability development.

Reverse Engineering

BlackHorse reverse engineers have state of the art experience in finding and developing exploits against desktop, mobile, embedded systems and devices, and enterprise systems. Our team develops target-specific analysis and approaches to provide a thorough assessment of potential vulnerabilities, exploits, and mitigations.

Access Automation

BlackHorse cyber enterprise developers combine enterprise and cyber expertise to automate access to targets—allowing operators to focus on their primary mission. Our engineers utilize User Centric Design to work closely with the system users and provide a system that allows users to be on-the-loop instead of in-the-loop.

CNO Development

BlackHorse CNO developers have extensive capabilities developing, testing, and deploying CNO Toolsets for operational readiness. We work alongside operators to ensure features are tailored to their mission requirements and preferences.

Tailored End-to-End Solutions

The BlackHorse Cyber Development team provides end-to-end solutions: from access to command and control integration, we ensure that the solution provides value to your mission. Our team leverages isolated development and test environments to ensure limited access to solutions prior to deployment. Our experience comes from a diverse background of engineering expertise leading to solutions with polished user experiences and well-designed, secure baselines.

BlackHorse engineers leverage leading-edge techniques to develop:

  • Command and Control Systems
  • Secure Communications Mechanisms
  • CNO Tools
  • Reverse Engineering Tools
  • Digital Force Protection Devices

Defensive Cybersecurity Operations

Our advanced defensive cybersecurity capabilities identify cyber threats, reduce vulnerabilities, and enhance internal and external cyber defenses for Government and commercial clients. Our cyber defense services enable clients to increase the speed in which they identify, attribute, and respond to increasingly complex cyber threats.

Proactive Cyber Defense Services

BlackHorse Solutions delivers a proactive and persistent cyber defense approach that ensures you and your organization are protected against ever-present cyber threats. These services are tailored for your unique concerns and technical requirements to mitigate organizational risks to digital infrastructure and networks. Real-world scenario-based engagements and hands-on support ensure you are confident in your cybersecurity posture. Our team will work to support both your company’s IT security requirements and business objectives. The primary services in this solution include Risk and Vulnerability Assessment, Cyber Threat Hunting, Incident Response, and Penetration Testing.

Government customers can purchase our Cyber Defense Services via the GSA Multiple Award Schedule (MAS) or acquire directly from us; commercial customers can issue purchase orders or other preferred methods of payment.

Learn more »

Risk and Vulnerability Assessment
  • Overall Threat Level Assessment​
  • Network Mapping​
  • Phishing Assessment​
  • Vulnerability Scanning​
  • Wireless Assessment​
  • Database Assessment
Cyber Threat Hunting
  • Identification of Key Threats​
  • Isolation of Advanced Attacks​
  • Iterative Approach to Improving Security Practices​
  • Highlight Emerging Threats​
  • Risk Mitigation Techniques for Advanced Attacks
Penetration Testing
  • Persistent Testing and Evaluation of Security Posture​s
  • Emulate Real-World Attacks​
  • Attempt to Circumvent Security​
  • Stress Test Applications, Systems, and Networks​
  • Advanced Testing Technique
Incident Response
  • On-Demand IT Support​
  • Determine Extent of Incident​​
  • Removal of Adversary from Systems
  • ​Restore Networks to Secure State​​
  • After-Action Reports​
  • Recommend Appropriate Training and Security Procedures

Innovative Research & Development

BlackHorse invests into research & development to enable our engineers to explore new challenges, ideas, and opportunities. Our cyber innovation lab is designed to rapidly take an idea to proof-of-concept and accelerate to long-term research and development effort. We leverage and investigate emerging technologies to create a variety of capabilities including:

Offensive Tools & Capabilities:

  • Platform Access Mechanisms
  • Stealth and Persistence Techniques
  • Survey Tools

Defensive Tools & Capabilities:

  • Risk and Vulnerability Assessment
  • Cyber Threat Hunting & Incident Response
  • Attribution Management