WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Why Visibility is an Essential Component of Your Application Security Approach

It’s funny how, over time, we accumulate knowledge that we encapsulate in a short phrase and then repeat it to each...
October 17, 2024
Est Read Time: 2 min

Pentester Spotlight: Alex Vaida

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
October 16, 2024
Est Read Time: 3 min

20 Types of Social Engineering Attacks Targeting Small Businesses

Social engineering attacks represent one of today's biggest cybersecurity risks, currently ranking as the second most...
October 15, 2024
Est Read Time: 7 min

Top 40 AI Cybersecurity Statistics

The latest AI cybersecurity statistics show an increase in artificial intelligence to power phishing, ransomware...
October 10, 2024
Est Read Time: 8 min

G2 Names Cobalt a Leader for Fall 2024

We are proud to announce that Cobalt has achieved multiple badges for the Fall 2024 Report by G2, the world’s largest...
October 10, 2024
Est Read Time: 2 min

A Pentester Guide to LDAP Bind Method Vulnerabilities

Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
October 9, 2024
Est Read Time: 6 min

Revealing AI Risks in Cybersecurity: Key Insights from the AI Risk Repository

The rise of artificial intelligence (AI) has transformed cybersecurity, offering advanced tools to detect and prevent...
October 9, 2024
Est Read Time: 4 min

15 Cybersecurity Influencers to Follow: Cybersecurity Awareness Month

October is Cybersecurity Awareness Month, a perfect time to learn from the brightest minds in the field.
October 7, 2024
Est Read Time: 6 min

Think Like an Attacker: Using OSINT to Safeguard Your Organization

In the cybersecurity world, knowledge is power. Threat actors have become increasingly adept at using Open-Source...
October 4, 2024
Est Read Time: 5 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.