GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

State of Pentesting 2024: The Impact of AI and LLMs on Penetration Testing

We are thrilled to present the sixth edition of our annual research report, The State of Pentesting 2024.

GDPR Data Protection Requirements: An Executive Overview

The General Data Protection Regulation (GDPR) forms a pillar for information privacy in the European Union and European...
Nov 4, 2024
Est Read Time: 10 min

European Cyber Resilience Act Overview: What Companies Need to Know

The European Council adopted the European Cyber Resilience Act (CRA) on October 10, 2024, initiating the countdown to...
Nov 1, 2024
Est Read Time: 6 min

Back to the Future with Cloud Penetration Testing

Understanding the evolution of cloud penetration testing is crucial for maintaining robust cybersecurity. The shift...
Oct 31, 2024
Est Read Time: 5 min

Overcoming Cybersecurity Challenges with Offensive Security Solutions

How do you do more with less in cybersecurity where you must constantly stay one step ahead of attackers? The easy...
Oct 30, 2024
Est Read Time: 4 min

Beyond the Perimeter: Exploring the Modern Attack Surface

Attack surface analysis is critical in securing your infrastructure and providing insight into potential ways intruders...
Oct 28, 2024
Est Read Time: 3 min

Top 10 Pentesting Certifications to Promote Your Career

Penetration testing certifications provide credible third-party proof of your skills, opening the door to increased...
Oct 25, 2024
Est Read Time: 6 min

Looking Back on Our 2024 Azores CAB

This year's Customer Advisory Board (CAB) meeting was nothing short of extraordinary. Set in the breathtaking Azores,...
Oct 24, 2024
Est Read Time: 2 min

How Attackers Bypass Office 365 MFA Checks: What Pentesters Need to Know

Vulnerabilities enable hackers to bypass Office 365 multi-factor authentication checks. Bad actors can use various...
Oct 21, 2024
Est Read Time: 7 min

Why Visibility is an Essential Component of Your Application Security Approach

It’s funny how, over time, we accumulate knowledge that we encapsulate in a short phrase and then repeat it to each...
Oct 17, 2024
Est Read Time: 2 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.