WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.
WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

3 Tips for Preparing for a Pentest

I’m the Chief Operations Officer at Cobalt, a Pen Testing as a Service company that has performed over 5800 pentests...
Oct 24, 2017
Est Read Time: 2 min

Spear Phishing with Go Phish Framework

What is Spear Phishing?
Oct 17, 2017
Est Read Time: 5 min

7 Steps to Building a Yearly Pentest Plan

Pentesting is a great way to check your security posture and is an essential part of an application security program....
Oct 17, 2017
Est Read Time: 4 min

Bypassing CSRF tokens with Python’s CGIHTTPServer to exploit SQL injections

There are ways to configure Burp using macros to bypass CSRF tokens on HTML forms, so we can use Burp Active Scans,...
Oct 11, 2017
Est Read Time: 4 min

How to Survive a Vendor Security Questionnaire

Tips on vendor assessments from experts in the industry
Aug 14, 2017
Est Read Time: 7 min

New Alternatives to Bug Bounty Programs

Before you can choose the right approach to test your application security, you first need to understand your options —...
Aug 2, 2017
Est Read Time: 4 min

UX-Friendly Enumeration Protection in Ruby on Rails

How to avoid revealing the existence of records to attackers in web applications, while keeping a good user experience...
May 23, 2017
Est Read Time: 4 min

Penetration Testing for SaaS Companies

SaaS companies have fundamentally transformed the enterprise software model and at this point it seems there is no...
May 8, 2017
Est Read Time: 3 min

Start at Zero with the OWASP Top 10

Engineering is an exercise in working within constraints. Appsec increases those constraints, forcing developers to...
Apr 24, 2017
Est Read Time: 3 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.