WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

A Pentester’s Guide to Cross-Site Request Forgery (CSRF)

November 13, 2020
Est Read Time: 4 min
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application...
Vulnerabilities

Lessons on Burnout: How to Protect Yourself & Your Team

November 12, 2020
Est Read Time: 4 min
Burnout can have 4 to 12 stages. According to Help Guide, there are even red flags that one can look out for. These red...
Cobalt Core

Cobalt Platform Deep Dive: New and Improved Navigation

November 1, 2020
Est Read Time: 2 min
What is new and improved navigation? There are a few core principles that web-based applications, especially SaaS or...
Cybersecurity Insights

A Pentester’s Guide to Cross-Site Scripting (XSS)

October 30, 2020
Est Read Time: 8 min
Examine a common security vulnerability, Cross-Site Scripting (XSS).
Vulnerabilities

Pentester Spotlight: Nikhil Srivastava

October 28, 2020
Est Read Time: 6 min
Nikhil Srivastava has been a top-performing pentester on the Cobalt platform for the past five years. He is an active...
Cobalt Core

Changelog — October 2020

October 26, 2020
Est Read Time: 2 min
Check out what we’ve been working on over the past month:
Product Updates

Design Sprints in Distributed Teams: How We Do it at Cobalt

October 25, 2020
Est Read Time: 4 min
A design sprint is a powerful tool for teams to work towards a shared vision to design and test features quickly....
Life at Cobalt

The Cobalt Core: A pentester community built on diversity, collaboration, and learning

October 21, 2020
Est Read Time: 3 min
The Cobalt Core is our highly-experienced, geographically-diverse community of pentesters. The community consists of...
Cobalt Core

A Pentester’s Guide to HTTP Request Smuggling

October 15, 2020
Est Read Time: 9 min
What is HTTP Request Smuggling? HTTP request smuggling is an attack technique that is conducted by interfering with the...
Vulnerabilities

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.