WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise
WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

How to Identify the Different Types of Malware

April 16, 2021
Est Read Time: 3 min
Cyberattacks continue to rise, with the level of sophistication of the attacks growing as businesses and organizations...
Cybersecurity Insights

Scheduling Pentests in Minutes: How The Cobalt Platform Saves Teams Valuable Time

April 14, 2021
Est Read Time: 2 min
Here’s a breakdown of the steps security teams have to take to schedule a pentest via traditional vendors. Notice that...
Product Updates

Pentester Spotlight: Martina Matarí

April 8, 2021
Est Read Time: 6 min
Martina Matarí joined the Cobalt Core, our highly-experienced, geographically-diverse community of pentesters, in 2020....
Pentester Stories

Changelog — March 2021

April 7, 2021
Est Read Time: 1 min
It's been a while since our last Changelog post. We've been hard at work to push some bigger changes to the Cobalt...
Product Updates

On-Demand, Streamlined, Interactive: SANS Reviews Our Pentest as a Service Platform

April 6, 2021
Est Read Time: 2 min
Traditional pentesting still raises numerous operational challenges for agile and fast-paced companies. We surveyed 165...
Modernizing Pentesting

CISOs Assemble: Shaping a Security Strategy

April 5, 2021
Est Read Time: 4 min
Cybersecurity Insights

Pentester Diaries Ep2: 2FA Bypass Techniques

April 1, 2021
Est Read Time: 17 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Pentester Stories Cobalt Core

Understanding the CVSS Base Score: An Essential Guide

April 1, 2021
Est Read Time: 5 min
A company is only as secure as its software. Any time a business introduces new technology into operations, sensitive...
Cybersecurity Insights

What is Cybersecurity Maturity Model Certification (CMMC)?

March 25, 2021
Est Read Time: 4 min
Addressing cyber threats in any organization remains critical. Threats such as ransomware, phishing, and Trojans have...
Compliance

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.