WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Cobalt’s Pentest Maturity Model: Which Level Are You?

March 23, 2021
Est Read Time: 3 min
The modern business world constantly faces digital threats. With companies facing these continuous threats,...
Cybersecurity Insights

Spotlight on Engineering: A Sneak Peek Into Cobalt's Engineering Teams

March 22, 2021
Est Read Time: 2 min
Over the past 7 years, Cobalt has evolved from a four-man startup into a provider of a leading Pentest as a Service...
Life at Cobalt

Crowdsourced Penetration Testing: PTaaS and PCI DSS Compliance

March 20, 2021
Est Read Time: 5 min
Various regulatory requirements that are lurking across different industries — involving different aspects of...
Compliance

Anatomy of the Session Management Tests

March 19, 2021
Est Read Time: 6 min
Note: This article has been created in light of the OWASP standards and descriptions.
Cobalt Core Vulnerabilities

Pentester Diaries Ep1: Understanding Business Logic

March 11, 2021
Est Read Time: 22 min
We are excited to share the first episode of a new podcast series, Pentester Diaries.
Vulnerabilities

Pentester Spotlight: Andreea Druga

March 4, 2021
Est Read Time: 7 min
Andreea Druga is a pentester with over six years of experience in the security arena with a master's degree in IT&C...
Cobalt Core

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

March 2, 2021
Est Read Time: 6 min
Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Vulnerabilities

A Pentester’s Guide to File Inclusion

February 19, 2021
Est Read Time: 4 min
Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Cobalt Core Vulnerabilities

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

February 16, 2021
Est Read Time: 10 min
Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Vulnerabilities

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.