PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentester Diaries Ep1: Understanding Business Logic

March 11, 2021
Est Read Time: 22 min
We are excited to share the first episode of a new podcast series, Pentester Diaries.
Pentester Guides

Pentester Spotlight: Andreea Druga

March 4, 2021
Est Read Time: 7 min
Andreea Druga is a pentester with over six years of experience in the security arena with a master's degree in IT&C...
Pentester Stories

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

March 2, 2021
Est Read Time: 6 min
Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Pentester Guides

A Pentester’s Guide to File Inclusion

February 19, 2021
Est Read Time: 4 min
Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Cobalt Core Pentester Guides

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

February 16, 2021
Est Read Time: 10 min
Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Pentester Guides

Business Cost of Cybercrime

February 11, 2021
Est Read Time: 8 min
Businesses around the world have faced a lot of challenges this past year.
Cybersecurity Insights

Pentester Spotlight: Jesus Arturo Espinoza Soto

February 11, 2021
Est Read Time: 4 min
How curiosity led a PHP programmer to web hacking and a collaborative pentest community of technology tinkerers. Jesus...
Pentester Stories

How to Communicate the Business Impact of Vulnerabilities

February 8, 2021
Est Read Time: 3 min
You’ve discovered a new vulnerability in your infrastructure. If you’re lucky, it’s something you can handle without...
Cybersecurity Insights

A Pentester’s Guide to WebSocket Pentesting

February 5, 2021
Est Read Time: 4 min
What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Pentester Guides Web Application Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.