Black Hat | Def Con 2024
Are you attending Black Hat? Meet the Cobalt team and Core at booth #2913!
Black Hat | Def Con 2024
Are you attending Black Hat? Meet the Cobalt team and Core at booth #2913!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

How to Choose the Best Penetration Testing Service Provider for Your Business

As businesses face an increasing number of cybersecurity threats, protecting sensitive data and maintaining customers'...
Apr 24, 2024
Est Read Time: 6 min

From Open Sources to Open Secrets: Largest Security Breaches Caused by Open Source Intelligence (OSINT) Oversights

Open Source Intelligence (OSINT) is an essential step for cybersecurity professionals. It enables them to gather...
Apr 19, 2024
Est Read Time: 7 min

Top Open Source Intelligence Tools & Techniques

Open source intelligence (OSINT) is a cornerstone of cybersecurity and penetration testing. As our digital footprints...
Apr 12, 2024
Est Read Time: 9 min

Understanding Brand Abuse: The Importance of Digital Risk Assessment

Cybersecurity is an important topic for all businesses. Being the victim of a cyberattack has many dire consequences....
Apr 1, 2024
Est Read Time: 4 min

The Evolution of Payment Security: Adapting to PCI-DSS 4.0 Standards

The Payment Card Industry Data Security Standard (PCI-DSS) is a set of security requirements designed to ensure that...
Mar 26, 2024
Est Read Time: 8 min

Large Language Model (LLM) Theft: Strategies for Prevention

Large Language Models (LLMs) process and generate human-like text, enabling applications in natural language...
Mar 15, 2024
Est Read Time: 7 min

LLM Insecure Output Handling

Large Language Models (LLMs), such as GPT-4, Gemini, and Mistral have become indispensable for powering everything from...
Mar 12, 2024
Est Read Time: 7 min

Introducing Dynamic Application Security Testing (DAST) in the Cobalt Platform

Cobalt, the pioneer of Pentest as a Service (PtaaS), is excited to announce the general availability of dynamic...
Mar 5, 2024
Est Read Time: 3 min

DAST vs IAST vs SAST vs RASP

Integrating security testing within the Software Development Lifecycle (SDLC) is a necessity to identify and mitigate...
Feb 27, 2024
Est Read Time: 7 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.