THREE PEAT
GigaOm Names Cobalt an “Outperformer” for Third Consecutive Year in Annual Radar Report for PTaaS.
THREE PEAT
GigaOm Names Cobalt an “Outperformer” for Third Consecutive Year in Annual Radar Report for PTaaS.

Overcoming Cybersecurity Challenges with Offensive Security Solutions

How do you do more with less in cybersecurity where you must constantly stay one step ahead of attackers? The easy...

2024 Pentester Spotlights: Wrapped

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Dec 10, 2024
Est Read Time: 1 min

General Hospital Cybersecurity Requirements in NYC and New York State: Rules and Recommendations

On October 2, 2024, the New York State Register published new hospital cybersecurity requirements for all general...
Dec 6, 2024
Est Read Time: 5 min

Cyber Kill Chain: Understanding How Cyberattacks Happen

The Cyber Kill Chain provides a framework for analyzing cyberattacks and developing defenses. Originally developed by...
Dec 5, 2024
Est Read Time: 6 min

Smart Contract Security Risks: Today's 10 Top Vulnerabilities and Mitigations

Smart contracts make it easier to execute digital agreements, but they can introduce security risks that compromise...
Dec 3, 2024
Est Read Time: 6 min

Introduction to AI Penetration Testing

As the adoption of AI and Large Language Model (LLM)-enabled applications grows, pentesters are uncovering...
Dec 2, 2024
Est Read Time: 5 min

Node.js Vulnerabilities: Securing against Common Risks

The Node.js runtime environment not only accelerates JavaScript applications and supports scalability, but it also...
Dec 2, 2024
Est Read Time: 10 min

Ensuring safe and equitable advancements in AI

When we think about technological advancements, it’s easy to focus on the "wow" factor. Cutting-edge tools, sleek...
Nov 29, 2024
Est Read Time: 2 min

Pentester Spotlight: Harshit Sengar

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Nov 28, 2024
Est Read Time: 5 min

A Deep Dive into Broken Functionality Level Authorization Vulnerability (BFLA)

What is Broken Functionality Level Authorization? Broken Functionality Level Authorization (BFLA) is a security flaw...
Nov 27, 2024
Est Read Time: 7 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.