PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI/LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI/LLM Applications

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

How to Write a Great Vulnerability Assessment Report with this Template

September 28, 2016
Est Read Time: 7 min
David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Pentester Guides

The Benefits of Crowdsourced Pen Testing Illustrated through Tetris

September 15, 2016
Est Read Time: 2 min
In this blog post Claus Cramon Houmann uses the popular video game, Tetris, to illustrate the advantages of...
Modernizing Pentesting

Bug Bounties on Bash on Ubuntu on Windows

July 19, 2016
Est Read Time: 4 min
Modernizing Pentesting

The Top 10 Vulnerabilities I used to reach #1 at Cobalt

July 13, 2016
Est Read Time: 4 min
Pentester Stories

The Forgotten Unserialization Vulnerability

June 28, 2016
Est Read Time: 4 min
Cybersecurity Insights

ImageTragick

May 31, 2016
Est Read Time: 5 min
There have been many high profile vulnerabilities discovered the last years. One of the most interesting...
Cybersecurity Insights

Deconstructing and Rewiring Bug Bounty Programs

March 24, 2016
Est Read Time: 5 min
On the surface, public bug bounty programs look like a no-brainer. You invite a number of security researchers to find...
Modernizing Pentesting

Interview with Vinod Tiwari (Vinod)

August 31, 2015
Est Read Time: 2 min
Pentester Stories

Bug Bounty Program Best Practices

July 30, 2015
Est Read Time: 2 min
Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.