GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.
GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.

How to Fix the Top 5 Web App Vulnerabilities

With all the innovation in digital technologies, web applications are often a significant part of an organization's...

Wake Up Call: The One Big Beautiful Bill Act's Hidden Meaning for Securing the Supply Chain

Think of the global economy less like a series of independent fortresses and more like a single, globe-spanning power...
Aug 1, 2025
Est Read Time: 4 min

A CISO's View of AI and Supply Chain Risks

As a CISO, I’m increasingly concerned about the new wave of cyber risks—particularly the vulnerabilities lurking in...
Jul 31, 2025
Est Read Time: 4 min

Thinking Like Attackers Do: Insights From SANS on Offensive Security

Ever feel like you’re playing a perpetual game of defense? I was reading a new SANS white paper, Adopting an Offensive...
Jul 24, 2025
Est Read Time: 2 min

The Intelligent Future: Our AI Manifesto

We're at a truly exciting point in our journey–not just for Cobalt, but for the world. Artificial intelligence is...
Jul 24, 2025
Est Read Time: 1 min

Beyond Annual Pentests: Building Your Offensive Security Program with Cobalt

For many organizations, the traditional approach of annual or ad-hoc pentesting simply isn't enough to keep up with...
Jul 23, 2025
Est Read Time: 2 min

Top 5 Unsolved Hacking Mysteries: Cybercriminals Who Got Away with It

For every hacker who gets caught, many more evade detection and punishment. Even some who get caught don't do jail...
Jul 22, 2025
Est Read Time: 7 min

Ghost in the Machine: Why Firmware Vulnerabilities Are the New Frontier of Risk

The recent disclosure of critical vulnerabilities in Gigabyte motherboard firmware serves as a potent, real-world...
Jul 21, 2025
Est Read Time: 4 min

When Accidents Are Actually Worse Than APTs

What’s more likely: Nation state actors compromised your network and applications through a brand new zero-day, or you...
Jul 17, 2025
Est Read Time: 2 min

Remote Code Execution: A Pentester's Guide to RCE

Remote code execution (RCE) is a vulnerability that allows attackers to remotely execute commands on a server over the...
Jul 16, 2025
Est Read Time: 3 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.