WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Ghost in the Machine: Why Firmware Vulnerabilities Are the New Frontier of Risk

July 21, 2025
Est Read Time: 4 min
The recent disclosure of critical vulnerabilities in Gigabyte motherboard firmware serves as a potent, real-world...
Cybersecurity Insights

When Accidents Are Actually Worse Than APTs

July 17, 2025
Est Read Time: 2 min
What’s more likely: Nation state actors compromised your network and applications through a brand new zero-day, or you...
Cybersecurity Insights

Remote Code Execution: A Pentester's Guide to RCE

July 16, 2025
Est Read Time: 3 min
Remote code execution (RCE) is a vulnerability that allows attackers to remotely execute commands on a server over the...
Pentester Guides

War Beyond Borders: Cyber Operations in Modern Geopolitical Conflicts

July 15, 2025
Est Read Time: 3 min
Throughout history, warfare has evolved in line with technology, from spears and swords to muskets and tanks, with each...
Cloud Security

Top Hacking Documentaries

July 10, 2025
Est Read Time: 5 min
Hollywood is calling! The thrilling world of hacking and cybersecurity, a realm of unseen battles and blurred lines,...
Cybersecurity Insights

Cellular Exploits in the Iran-Israel Conflict and How Pentesting Mirrors Modern Warfare

July 9, 2025
Est Read Time: 3 min
In the evolving conflict between Iran and Israel, the battlefield has extended beyond land and air. Cellular...
Cybersecurity Insights Industry Breakdowns

The Unseen War: Cyber Warfare in the Shadow of Global Conflicts

July 8, 2025
Est Read Time: 4 min
As of June 2025, while missiles and drones dominate news cycles in conflicts like Israel-Iran and Russia-Ukraine, a...
Modernizing Pentesting

We're All In: Join Cobalt As We Go Big at Black Hat, BSides, & DEF CON

July 2, 2025
Est Read Time: 4 min
As August approaches, the energy in the cybersecurity world invariably shifts to one vibrant, buzzing city: Las Vegas!...
Events

Half-Life Tells the Whole Remediation Story

June 27, 2025
Est Read Time: 4 min
Mean (or median) time to response (MTTR) is the de facto standard for measuring how long it takes to perform a security action. Whether it’s responding to an attack, remediating vulnerabilities, or resolving pentest findings, MTTR is one of the most commonly reported statistics across industry reports.
State of Pentesting Industry Breakdowns
    2 3 4 5 6

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.