PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Thinking Like Attackers Do: Insights From SANS on Offensive Security

July 24, 2025
Est Read Time: 2 min
Ever feel like you’re playing a perpetual game of defense? I was reading a new SANS white paper, Adopting an Offensive...
Cybersecurity Insights

The Intelligent Future: Our AI Manifesto

July 24, 2025
Est Read Time: 1 min
We're at a truly exciting point in our journey–not just for Cobalt, but for the world. Artificial intelligence is...
Life at Cobalt AI Pentesting

Beyond Annual Pentests: Building Your Offensive Security Program with Cobalt

July 23, 2025
Est Read Time: 2 min
For many organizations, the traditional approach of annual or ad-hoc pentesting simply isn't enough to keep up with...
Product Updates

Top 5 Unsolved Hacking Mysteries: Cybercriminals Who Got Away with It

July 22, 2025
Est Read Time: 7 min
For every hacker who gets caught, many more evade detection and punishment. Even some who get caught don't do jail...
Cybersecurity Insights

Ghost in the Machine: Why Firmware Vulnerabilities Are the New Frontier of Risk

July 21, 2025
Est Read Time: 4 min
The recent disclosure of critical vulnerabilities in Gigabyte motherboard firmware serves as a potent, real-world...
Cybersecurity Insights

When Accidents Are Actually Worse Than APTs

July 17, 2025
Est Read Time: 2 min
What’s more likely: Nation state actors compromised your network and applications through a brand new zero-day, or you...
Cybersecurity Insights

Remote Code Execution: A Pentester's Guide to RCE

July 16, 2025
Est Read Time: 3 min
Remote code execution (RCE) is a vulnerability that allows attackers to remotely execute commands on a server over the...
Pentester Guides

War Beyond Borders: Cyber Operations in Modern Geopolitical Conflicts

July 15, 2025
Est Read Time: 3 min
Throughout history, warfare has evolved in line with technology, from spears and swords to muskets and tanks, with each...
Cloud Security

Top Hacking Documentaries

July 10, 2025
Est Read Time: 5 min
Hollywood is calling! The thrilling world of hacking and cybersecurity, a realm of unseen battles and blurred lines,...
Cybersecurity Insights
    2 3 4 5 6

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.