WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Top 10 API Security Validation Techniques

Through the use of APIs and applications, the business world is becoming a more interconnected place every day. This...
June 28, 2024
Est Read Time: 7 min

What is Cloud Penetration Testing? How PtaaS Increases Network Resilience

Cloud penetration testing can be the most effective way to increase your network's resilience.
June 26, 2024
Est Read Time: 6 min

Testing for Reflective XSS

Reflected XSS, also known as Reflected Cross-Site Scripting, is a dangerous vulnerability that occurs when a web...
June 24, 2024
Est Read Time: 16 min

FDA cybersecurity guidance summarized

The U.S. Food and Drug Administration (FDA) recently issued updated guidance for cybersecurity in medical devices. The...
June 21, 2024
Est Read Time: 5 min

Pentester Spotlight: Mrityunjoy Biswas

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
June 20, 2024
Est Read Time: 4 min

11 Biggest Cybersecurity Attacks in History

Cyberattacks happen every day — in fact every 39 seconds there is a cyberattack.
June 20, 2024
Est Read Time: 9 min

Six Pentest Phases: An Inside Look at Pentesting

Navigating a pentest calls for insights into business processes and the technical components that support them....
June 18, 2024
Est Read Time: 2 min

FBI Dismantles World's Largest Botnet: 911 S5 Botnet

This content was co-authored by AI. Discover our editorial practices.
June 18, 2024
Est Read Time: 3 min

Browser Security: Same Origin Policy vs CORS, Misconfigurations

This blog guides how to understand and evaluate CORS (Cross-Origin Resource Sharing) misconfigurations. As pentesters,...
June 11, 2024
Est Read Time: 12 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.