GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

When Generative AI Goes Wrong: Security Lessons from 8 Top Artificial Intelligence Incidents

Like any major technology, generative AI holds both promise of great benefits and potential for great risks. As...
Oct 2, 2024
Est Read Time: 9 min

Anonymous FTP Servers: How to Prevent Compromising Your Security

Anonymous FTP servers represent a legacy technology, but they remain in use, and their security vulnerabilities remain...
Oct 1, 2024
Est Read Time: 5 min

Insecure Plugin Design in LLMs: Prevention Strategies

Insecure plugin design in language learning models enables attackers to automatically launch malicious requests. This...
Sep 26, 2024
Est Read Time: 5 min

Introducing Sonali Shah, Cobalt’s New CEO

On August 28th, 2024, Cobalt announced the appointment of Sonali Shah as its new Chief Executive Officer. With an...
Sep 25, 2024
Est Read Time: 3 min

Pentester Guide: Weak or Default Credentials

Weak or default credentials are a common security flaw that attackers can exploit with minimal effort. They often lead...
Sep 24, 2024
Est Read Time: 4 min

Demystifying the Digital Operational Resilience Act (DORA)

Are you a financial institution within the European Union, or do you provide financial market services in the EU or...
Sep 20, 2024
Est Read Time: 3 min

Using AI for Offensive Security: Executive Report Summary

The Cloud Security Alliance (CSA) has released an important new report on Using AI for Offensive Security. The report...
Sep 19, 2024
Est Read Time: 6 min

Pentesting vs Bug Bounty: Which is Better for Your Company's Security?

Penetration testing (pentesting) and bug bounty programs (bug bounties) are a common part of companies' cybersecurity...
Sep 18, 2024
Est Read Time: 7 min

LLM Supply Chain Attack: Prevention Strategies

LLM supply chain attack vulnerabilities have emerged as a top risk for machine learning models. Third-party training...
Sep 16, 2024
Est Read Time: 6 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.