WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.
WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Top 40 AI Cybersecurity Statistics

The latest AI cybersecurity statistics show an increase in artificial intelligence to power phishing, ransomware...
Oct 10, 2024
Est Read Time: 8 min

G2 Names Cobalt a Leader for Fall 2024

We are proud to announce that Cobalt has achieved multiple badges for the Fall 2024 Report by G2, the world’s largest...
Oct 10, 2024
Est Read Time: 2 min

A Pentester Guide to LDAP Bind Method Vulnerabilities

Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
Oct 9, 2024
Est Read Time: 6 min

Revealing AI Risks in Cybersecurity: Key Insights from the AI Risk Repository

The rise of artificial intelligence (AI) has transformed cybersecurity, offering advanced tools to detect and prevent...
Oct 9, 2024
Est Read Time: 4 min

15 Cybersecurity Influencers to Follow: Cybersecurity Awareness Month

October is Cybersecurity Awareness Month, a perfect time to learn from the brightest minds in the field.
Oct 7, 2024
Est Read Time: 6 min

Think Like an Attacker: Using OSINT to Safeguard Your Organization

In the cybersecurity world, knowledge is power. Threat actors have become increasingly adept at using Open-Source...
Oct 4, 2024
Est Read Time: 5 min

LLM Overreliance: What It Is and How to Prevent

Even back in Episode V, C3PO expected R2D2 to know better than to trust a strange computer, but nearly half a century...
Oct 3, 2024
Est Read Time: 5 min

When Generative AI Goes Wrong: Security Lessons from 8 Top Artificial Intelligence Incidents

Like any major technology, generative AI holds both promise of great benefits and potential for great risks. As...
Oct 2, 2024
Est Read Time: 9 min

Anonymous FTP Servers: How to Prevent Compromising Your Security

Anonymous FTP servers represent a legacy technology, but they remain in use, and their security vulnerabilities remain...
Oct 1, 2024
Est Read Time: 5 min
    7 8 9 10 11

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.