WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise
WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

4 Tips for Making the Most of a Pen Test Report

November 21, 2017
Est Read Time: 3 min
Modernizing Pentesting

4 Tips to Successfully Kick Off a Pentest

November 7, 2017
Est Read Time: 3 min
My name is Kevin Bourne and I’m the Customer Success Manager at Cobalt. Over the past six months, I’ve kicked off +150...
Modernizing Pentesting

Kerberoast Attack Techniques

November 1, 2017
Est Read Time: 5 min
In this blog we will focus on Kerberoast attack techniques (Old Technique and New Technique).
Pentester Guides

3 Tips for Preparing for a Pentest

October 24, 2017
Est Read Time: 2 min
I’m the Chief Operations Officer at Cobalt, a Pen Testing as a Service company that has performed over 5800 pentests...
Modernizing Pentesting

Spear Phishing with Go Phish Framework

October 17, 2017
Est Read Time: 5 min
What is Spear Phishing?
Cobalt Core Pentester Guides

7 Steps to Building a Yearly Pentest Plan

October 17, 2017
Est Read Time: 4 min
Pentesting is a great way to check your security posture and is an essential part of an application security program....
Modernizing Pentesting

Bypassing CSRF tokens with Python’s CGIHTTPServer to exploit SQL injections

October 11, 2017
Est Read Time: 4 min
There are ways to configure Burp using macros to bypass CSRF tokens on HTML forms, so we can use Burp Active Scans,...
Modernizing Pentesting

How to Survive a Vendor Security Questionnaire

August 14, 2017
Est Read Time: 7 min
Tips on vendor assessments from experts in the industry
Cybersecurity Insights

New Alternatives to Bug Bounty Programs

August 2, 2017
Est Read Time: 4 min
Before you can choose the right approach to test your application security, you first need to understand your options —...
Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.