WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

March 2, 2021
Est Read Time: 6 min
Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Vulnerabilities

A Pentester’s Guide to File Inclusion

February 19, 2021
Est Read Time: 4 min
Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Cobalt Core Vulnerabilities

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

February 16, 2021
Est Read Time: 10 min
Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Vulnerabilities

Business Cost of Cybercrime

February 11, 2021
Est Read Time: 8 min
Businesses around the world have faced a lot of challenges this past year.
Cybersecurity Insights

Pentester Spotlight: Jesus Arturo Espinoza Soto

February 11, 2021
Est Read Time: 4 min
How curiosity led a PHP programmer to web hacking and a collaborative pentest community of technology tinkerers. Jesus...
Cobalt Core

How to Communicate the Business Impact of Vulnerabilities

February 8, 2021
Est Read Time: 3 min
You’ve discovered a new vulnerability in your infrastructure. If you’re lucky, it’s something you can handle without...
Cybersecurity Insights

A Pentester’s Guide to WebSocket Pentesting

February 5, 2021
Est Read Time: 4 min
What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Web Application Pentesting Vulnerabilities

Prevent Whaling Phishing Attacks with Cybersecurity Awareness

January 29, 2021
Est Read Time: 5 min
Although whale phishing isn’t anything new and existed since the early 90s, the FBI reports an increase in cyberattacks...
Cybersecurity Insights Cybersecurity Services

Bypassing the Protections — MFA Bypass Techniques for the Win

January 27, 2021
Est Read Time: 6 min
Multi-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added...
Vulnerabilities

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.