PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Mass Assignment & APIs - Exploitation in the Wild

May 1, 2023
Est Read Time: 6 min
APIs have become an integral part of many applications, with REST APIs being a popular choice for implementation. However, this popularity has led to security risks, with OWASP API Top 10 identifying vulnerabilities commonly found in APIs, including mass assignment. Harsh Bothra writes about this in his latest blog.
Cobalt Core Pentester Guides API Pentesting

Pentesting Containers: Overview & Security Best Practices

April 28, 2023
Est Read Time: 4 min
Containers are packages that provide operating system (OS) Level Virtualization. They deliver software or an...
Modernizing Pentesting

Pentester Spotlight: Rajanish Pathak

April 27, 2023
Est Read Time: 3 min
Rajanish Pathak is a Security Researcher from Goa, India, and a member of the Cobalt Core. His passion for cybersecurity was ignited by his curiosity about how systems work and how they can be breached. Read about Rajanish in his pentester spotlight.
Pentester Stories Cobalt Core

Manual Versus Automated Penetration Testing

April 26, 2023
Est Read Time: 9 min
Penetration testing or pentesting is the process of finding vulnerabilities in a company's systems by simulating a...
Modernizing Pentesting

Types of Penetration Testing Reports: Analyzing Pentest Data for Trends

April 25, 2023
Est Read Time: 5 min
In today's cybersecurity landscape, security is always evolving. This requires companies to understand the nuances of...
Modernizing Pentesting

Exploiting Buffer Overflow Vulnerabilities: A Step-by-Step Guide (Part 2)

April 24, 2023
Est Read Time: 18 min
Buffer overflow vulnerability happens when data written to a buffer exceeds its size, which may overwrite important data or execute malicious code. Attackers can exploit these vulnerabilities to gain unauthorized access, execute malicious code, or steal sensitive data. This blog will provide an overview of buffer overflow exploitation, including its causes, consequences, and the methods attackers use to exploit it. It's important to understand the basics before diving into exploitation and steps of buffer overflow.
Cobalt Core Pentester Guides

The Top 20 Penetration Testing Tools for Cybersecurity in 2023

April 21, 2023
Est Read Time: 7 min
To combat the growing number of sophisticated cyber threats, security professionals must stay up-to-date with the...
Modernizing Pentesting

Hacker Corner Episode 2: Managing a Community of 400+ Hackers

April 19, 2023
Est Read Time: 3 min
On this episode of Hacker Corner, host Sheeraz Ali sits down with Community Manager Elizabeth Ramirez to talk about managing a community of 400+ hackers.
Cobalt Core

A Pentester’s Guide to Dependency Confusion Attacks

April 17, 2023
Est Read Time: 7 min
This blog post discusses the concept of "Dependency Confusion" in software development, where malicious code is injected into third-party dependencies, such as libraries or frameworks, that applications use.
Cobalt Core Pentester Guides

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.