WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.
WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentester Diaries Ep2: 2FA Bypass Techniques

Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Apr 1, 2021
Est Read Time: 17 min

Understanding the CVSS Base Score: An Essential Guide

A company is only as secure as its software. Any time a business introduces new technology into operations, sensitive...
Apr 1, 2021
Est Read Time: 5 min

What is Cybersecurity Maturity Model Certification (CMMC)?

Addressing cyber threats in any organization remains critical. Threats such as ransomware, phishing, and Trojans have...
Mar 25, 2021
Est Read Time: 4 min

Cobalt Platform Deep Dive: Pentest Coverage Checklist

This blog post is part of an ongoing series in which members of the Cobalt product team provide deep dives into...
Mar 23, 2021
Est Read Time: 2 min

Cobalt’s Pentest Maturity Model: Which Level Are You?

The modern business world constantly faces digital threats. With companies facing these continuous threats,...
Mar 23, 2021
Est Read Time: 3 min

Spotlight on Engineering: A Sneak Peek Into Cobalt's Engineering Teams

Over the past 7 years, Cobalt has evolved from a four-man startup into a provider of a leading Pentest as a Service...
Mar 22, 2021
Est Read Time: 2 min

Anatomy of the Session Management Tests

Note: This article has been created in light of the OWASP standards and descriptions.
Mar 19, 2021
Est Read Time: 6 min

Pentester Diaries Ep1: Understanding Business Logic

We are excited to share the first episode of a new podcast series, Pentester Diaries.
Mar 11, 2021
Est Read Time: 22 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.