WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Large Language Model (LLM) Theft: Strategies for Prevention

March 15, 2024
Est Read Time: 10 min
Large Language Models (LLMs) process and generate human-like text, enabling applications in natural language...
AI Pentesting

LLM Insecure Output Handling

March 12, 2024
Est Read Time: 7 min
Large Language Models (LLMs), such as GPT-4, Gemini, and Mistral have become indispensable for powering everything from...

Introducing Dynamic Application Security Testing (DAST) in the Cobalt Platform

March 5, 2024
Est Read Time: 3 min
Cobalt, the pioneer of Pentest as a Service (PtaaS), is excited to announce the general availability of dynamic...
Product Updates

DAST vs IAST vs SAST vs RASP

February 27, 2024
Est Read Time: 7 min
Integrating security testing within the Software Development Lifecycle (SDLC) is a necessity to identify and mitigate...
Cybersecurity Services

Medical Device Security Risk Assessment: What Companies Need to Know

February 22, 2024
Est Read Time: 6 min
In an era where technology and healthcare converge, the security of medical devices has never been more critical.
Cybersecurity Services

Penetration Testing Pricing: PtaaS vs Traditional Pentesting Costs

February 19, 2024
Est Read Time: 5 min
(Editor’s Note: This blog post is based on a study conducted in 2017. A follow-up Pentest as a Service Impact Report,...
Modernizing Pentesting

Pentester Spotlight: Shahrukh Rafeeq

February 15, 2024
Est Read Time: 6 min
The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Cobalt Core

Scaling Securely: How Enterprises Can Leverage DevSecOps

February 1, 2024
Est Read Time: 5 min
In today’s business environment, balancing development operations (DevOps) and security operations (SecOps) has become...
Cybersecurity Insights

LLMNR Poisoning, NTLM Relay and More

January 31, 2024
Est Read Time: 14 min
In this article we’ll touch on what are the hash types used in Windows systems, what is the LLMNR protocol, how it...
Vulnerabilities

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.