WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise
WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Gartner Names Cobalt in Report on DevSecOps Tools for Secure Software Delivery

March 15, 2023
Est Read Time: 2 min
Gartner's recent report “How to Select DevSecOps Tools for Secure Software Delivery” gives a birds-eye view of the technology landscape, emphasizing the benefits to integrating developer-friendly tools into DevOps pipelines. In a section of the report titled “Preproduction and Release Phases” Gartner name-drops Cobalt as a representative penetration testing vendor.
Modernizing Pentesting

Active Directory Series: Active Directory Fundamentals

March 13, 2023
Est Read Time: 12 min
Active Directory is a Microsoft service that provides centralized management of user accounts, devices, and access to resources in a networked environment. It allows IT professionals to create and manage users, groups, computers, and other resources on a network, and control access to those resources based on policies and permissions.
Cobalt Core Pentester Guides

Cobalt Release Blog: February 2023

March 10, 2023
Est Read Time: 1 min
Read about the improvements we launched to our PtaaS Platform last month: new integrations, asset vulnerability updates, and more.
Product Updates

The Life of a Bug

March 3, 2023
Est Read Time: 5 min
With this post I'll present a way to better understand bugs, from their origin until their death. I’ll do this by introducing the idea of a security bug pipeline and Fix-to-Fix framework.
Modernizing Pentesting

Decoding the Differences: Black, Gray, and White-Box Pentests

March 1, 2023
Est Read Time: 5 min
Different types of pentesting methods have designated colors with the key differences.
Cybersecurity Insights

Security Touchpoints in the Big Data Lifecycle

February 28, 2023
Est Read Time: 9 min
More and more teams want to access the sensitive data you're managing? Here's a guide on how to keep it secure while enabling the business to innovate.
Cybersecurity Insights

Pentester’s Guide to XPATH Injection

February 27, 2023
Est Read Time: 6 min
XPath is a powerful language used to query and manipulate XML documents. It allows you to extract data, transform XML documents, query large datasets, and modify the structure and content of XML documents. XPath injection attacks occur when an attacker manipulates XPath statements to gain unauthorized access to sensitive data.
Cobalt Core Pentester Guides

Back to Basics: How to Build Resilient Blue Teams

February 24, 2023
Est Read Time: 11 min
A comprehensive guide on how security teams can keep up with organizational change.
Cybersecurity Insights

Pentester Spotlight: Goonjeta Malhotra

February 23, 2023
Est Read Time: 2 min
“Pentesting allowed me to challenge my skills and knowledge, to think of creative ways to exploit and identify vulnerabilities, and always to find ways to improve security posture." That's what Core Pentester Goonjeta Malhotra said about her journey into pentesting. Learn more about Goonjeta in here Pentester Spotlight.
Pentester Stories Cobalt Core

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.