Live DEMO
Join us for a live demo of our pentest for AI and LLMs.
Live DEMO
Join us for a live demo of our pentest for AI and LLMs.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

What is Cybersecurity Maturity Model Certification (CMMC)?

Addressing cyber threats in any organization remains critical. Threats such as ransomware, phishing, and Trojans have...
Mar 25, 2021
Est Read Time: 4 min

Cobalt Platform Deep Dive: Pentest Coverage Checklist

This blog post is part of an ongoing series in which members of the Cobalt product team provide deep dives into...
Mar 23, 2021
Est Read Time: 2 min

Cobalt’s Pentest Maturity Model: Which Level Are You?

The modern business world constantly faces digital threats. With companies facing these continuous threats,...
Mar 23, 2021
Est Read Time: 3 min

Spotlight on Engineering: A Sneak Peek Into Cobalt's Engineering Teams

Over the past 7 years, Cobalt has evolved from a four-man startup into a provider of a leading Pentest as a Service...
Mar 22, 2021
Est Read Time: 2 min

Anatomy of the Session Management Tests

Note: This article has been created in light of the OWASP standards and descriptions.
Mar 19, 2021
Est Read Time: 6 min

Pentester Diaries Ep1: Understanding Business Logic

We are excited to share the first episode of a new podcast series, Pentester Diaries.
Mar 11, 2021
Est Read Time: 22 min

Pentester Spotlight: Andreea Druga

Andreea Druga is a pentester with over six years of experience in the security arena with a master's degree in IT&C...
Mar 4, 2021
Est Read Time: 7 min

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Mar 2, 2021
Est Read Time: 6 min

A Pentester’s Guide to File Inclusion

Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Feb 19, 2021
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.