WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.
WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Lessons Learned from the MGM Breach

The recent arrest of a teenager linked to last year's MGM cyberattack is a stark reminder that no organization,...
Aug 5, 2024
Est Read Time: 4 min

Cut Through the Noise: The Value of Secure Code Reviews

With the expansion of the attack surface, a backlog of entries for the NVD, and the reliance on software to do pretty...
Aug 1, 2024
Est Read Time: 5 min

6 New Cybersecurity Regulations to Prepare for in 2024

New cybersecurity regulations going into effect in 2024 place unprecedented compliance demands on organizations. Some...
Jul 30, 2024
Est Read Time: 13 min

The 6 Layers of Offensive Security Testing (and Why They Matter)

The security of our online assets has never been more critical.
Jul 26, 2024
Est Read Time: 9 min

Understanding Your Digital Risk Profile: Introduction to Pretexting

The 2024 Verizon Data Breach Investigations Report highlights a significant trend in the realm of cybersecurity...
Jul 19, 2024
Est Read Time: 7 min

How Digital Risk Assessments Can Protect Your Business from the RockYou2024 Password Leak

On July 4th, 2024, a hacker posted a file named "rockyou2024.txt" on a popular hacking forum, containing 9.9 billion...
Jul 15, 2024
Est Read Time: 2 min

How Pentesting Reduces Costs of Cybersecurity Insurance

Cybersecurity insurance, also known as cyber liability insurance, protects businesses from financial losses resulting...
Jul 3, 2024
Est Read Time: 7 min

Top 10 API Security Validation Techniques

Through the use of APIs and applications, the business world is becoming a more interconnected place every day. This...
Jun 28, 2024
Est Read Time: 7 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.