PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI/LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI/LLM Applications

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

April 9, 2019
Est Read Time: 2 min
I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Cobalt Core Pentester Guides

From SSRF to Port Scanner

March 18, 2019
Est Read Time: 4 min
How to convert a SSRF vulnerability into a Port Scanner
Pentester Guides

A Manager’s Guide to Selecting the Best Testing Approach for Your Application Security Needs

March 14, 2019
Est Read Time: 9 min
Security testing has emerged as a common best practice among application security programs of all types and sizes. The...
Cybersecurity Insights

3 things you should be doing when you pentest an Android application

January 18, 2019
Est Read Time: 2 min
To perform a pentest on an android application there are three important things that should be done by the pentester.
Cybersecurity Insights Mobile Application Pentesting

What does it take to be a top Cobalt Core researcher?

January 14, 2019
Est Read Time: 3 min
Cobalt Core

Pentesting in the Era of APIs and Microservices

May 31, 2018
Est Read Time: 2 min
Cybersecurity Insights API Pentesting

Humans of InfoSec: A New Security Podcast

April 5, 2018
Est Read Time: 2 min
https://soundcloud.com/humans-of-infosec
Cybersecurity Insights

How to Choose a Pentest Service

March 14, 2018
Est Read Time: 3 min
Penetration testing or pentesting for short is a simulation of an attack on your company’s IT infrastructure or...
Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.