GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.
GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Women in Cyber: Willa Riggins

In celebration of Women's History Month, we're spotlighting the incredible women of Cobalt throughout March. Each...
Mar 25, 2025
Est Read Time: 3 min

Introducing CVSS Scores and More Pentest Reporting Enhancements

Understanding your vulnerabilities and their potential impact is crucial for effective risk management. That is why...
Mar 20, 2025
Est Read Time: 3 min

Women in Cyber: Sonali Shah

In celebration of Women's History Month, we're spotlighting the incredible women of Cobalt throughout March. Each...
Mar 19, 2025
Est Read Time: 2 min

Women in Cyber: Grace Gross

In celebration of Women's History Month, we're spotlighting the incredible women of Cobalt throughout March. Each...
Mar 14, 2025
Est Read Time: 2 min

Women in Cyber: Zaina Mukhtar

In celebration of Women's History Month, we're spotlighting the incredible women of Cobalt throughout March. Each...
Mar 14, 2025
Est Read Time: 2 min

Pentester Spotlight: Cindee Tran

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Mar 13, 2025
Est Read Time: 5 min

Meet Mike Garon, Cobalt's New VP of Engineering

We are thrilled to announce that Mike Garon is joining us as our new Vice President of Engineering.
Mar 11, 2025
Est Read Time: 2 min

Why Security Must Be at the Core of AI Development

The rapid rise of artificial intelligence has brought groundbreaking advancements—but also significant security...
Mar 10, 2025
Est Read Time: 4 min

Women in Cyber: Noelle Hori

In celebration of Women's History Month, we're spotlighting the incredible women of Cobalt throughout March. Each...
Mar 5, 2025
Est Read Time: 2 min
    2 3 4 5 6

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.