WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

The Benefits of Crowdsourced Pen Testing Illustrated through Tetris

September 15, 2016
Est Read Time: 2 min
In this blog post Claus Cramon Houmann uses the popular video game, Tetris, to illustrate the advantages of...
Modernizing Pentesting

Bug Bounties on Bash on Ubuntu on Windows

July 19, 2016
Est Read Time: 4 min
Modernizing Pentesting

The Forgotten Unserialization Vulnerability

June 28, 2016
Est Read Time: 4 min
Cybersecurity Insights

ImageTragick

May 31, 2016
Est Read Time: 5 min
There have been many high profile vulnerabilities discovered the last years. One of the most interesting...
Cybersecurity Insights

Deconstructing and Rewiring Bug Bounty Programs

March 24, 2016
Est Read Time: 5 min
On the surface, public bug bounty programs look like a no-brainer. You invite a number of security researchers to find...
Modernizing Pentesting

Interview with Vinod Tiwari (Vinod)

August 31, 2015
Est Read Time: 2 min
Cobalt Core

Bug Bounty Program Best Practices

July 30, 2015
Est Read Time: 2 min
Modernizing Pentesting

Cobalt. Connected Intelligent Security.

June 14, 2015
Est Read Time: 1 min
Product Updates Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.