WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

From SSRF to Port Scanner

March 18, 2019
Est Read Time: 4 min
How to convert a SSRF vulnerability into a Port Scanner
Vulnerabilities

A Manager’s Guide to Selecting the Best Testing Approach for Your Application Security Needs

March 14, 2019
Est Read Time: 9 min
Security testing has emerged as a common best practice among application security programs of all types and sizes. The...
Cybersecurity Insights

3 things you should be doing when you pentest an Android application

January 18, 2019
Est Read Time: 2 min
To perform a pentest on an android application there are three important things that should be done by the pentester.
Cybersecurity Insights Mobile Application Pentesting

What does it take to be a top Cobalt Core researcher?

January 14, 2019
Est Read Time: 3 min
Cobalt Core

Pentesting in the Era of APIs and Microservices

May 31, 2018
Est Read Time: 2 min
Cybersecurity Insights API Pentesting

Humans of InfoSec: A New Security Podcast

April 5, 2018
Est Read Time: 2 min
https://soundcloud.com/humans-of-infosec
Cybersecurity Insights

How to Choose a Pentest Service

March 14, 2018
Est Read Time: 3 min
Penetration testing or pentesting for short is a simulation of an attack on your company’s IT infrastructure or...
Modernizing Pentesting

3 Key Factors for Improving a Pen Test

January 5, 2018
Est Read Time: 2 min
Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.