WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Cyber Kill Chain: Understanding How Cyberattacks Happen

December 4, 2024
Est Read Time: 6 min
The Cyber Kill Chain provides a framework for analyzing cyberattacks and developing defenses. Originally developed by...
Modernizing Pentesting

Smart Contract Security Risks: Today's 10 Top Vulnerabilities and Mitigations

December 3, 2024
Est Read Time: 6 min
Smart contracts make it easier to execute digital agreements, but they can introduce security risks that compromise...
Cybersecurity Insights

Node.js Vulnerabilities: Securing against Common Risks

December 2, 2024
Est Read Time: 10 min
The Node.js runtime environment not only accelerates JavaScript applications and supports scalability, but it also...
Vulnerabilities

Ensuring Safe and Equitable Advancements in AI

November 29, 2024
Est Read Time: 2 min
When we think about technological advancements, it’s easy to focus on the "wow" factor. Cutting-edge tools, sleek...
AI Pentesting

Pentester Spotlight: Harshit Sengar

November 28, 2024
Est Read Time: 5 min
The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Cobalt Core

A Deep Dive into Broken Functionality Level Authorization Vulnerability (BFLA)

November 27, 2024
Est Read Time: 7 min
What is Broken Functionality Level Authorization? Broken Functionality Level Authorization (BFLA) is a security flaw...
Vulnerabilities

It’s a Three-Peat! Cobalt Named “Outperformer” for the Third Year Running in GigaOm’s Radar Report for PTaaS

November 22, 2024
Est Read Time: 5 min
What is it about winning something three years in a row that is so difficult? Almost all of the teams and individuals...
Modernizing Pentesting

A Breakdown of E-Mail Security

November 21, 2024
Est Read Time: 6 min
Email has become an essential communication tool, but with its rise, so have email-based threats. From phishing scams...
Vulnerabilities

Empowering Security and Compliance: How Cobalt and Vanta’s Integration Streamlines Vulnerability Management

November 13, 2024
Est Read Time: 2 min
In today's rapidly evolving tech landscape, security and compliance are non-negotiable for growing companies. As...
Partners

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.