PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI/LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI/LLM Applications

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Bypassing CSRF tokens with Python’s CGIHTTPServer to exploit SQL injections

October 11, 2017
Est Read Time: 4 min
There are ways to configure Burp using macros to bypass CSRF tokens on HTML forms, so we can use Burp Active Scans,...
Modernizing Pentesting

How to Survive a Vendor Security Questionnaire

August 14, 2017
Est Read Time: 7 min
Tips on vendor assessments from experts in the industry
Cybersecurity Insights

New Alternatives to Bug Bounty Programs

August 2, 2017
Est Read Time: 4 min
Before you can choose the right approach to test your application security, you first need to understand your options —...
Modernizing Pentesting

UX-Friendly Enumeration Protection in Ruby on Rails

May 23, 2017
Est Read Time: 4 min
How to avoid revealing the existence of records to attackers in web applications, while keeping a good user experience...
Cobalt Core Pentester Guides

Penetration Testing for SaaS Companies

May 8, 2017
Est Read Time: 3 min
SaaS companies have fundamentally transformed the enterprise software model and at this point it seems there is no...
Modernizing Pentesting

Start at Zero with the OWASP Top 10

April 24, 2017
Est Read Time: 3 min
Engineering is an exercise in working within constraints. Appsec increases those constraints, forcing developers to...
Cybersecurity Insights

Introducing In-App Pentest Reports

March 28, 2017
Est Read Time: 1 min
My name is Kevin Bourne and I recently joined Cobalt as their new Customer Success Manager. My primary responsibility...
Product Updates

The Third Wave of Application Security

January 26, 2017
Est Read Time: 8 min
Cybersecurity Insights

Pen Test Metrics 101: Detailed Definitions

January 9, 2017
Est Read Time: 6 min
This post is the second in a series I am writing about how to use pen test data in security metrics to analyze and...
Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.