<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://www.cobalt.io/blog</link>
    <description>Insights for security leaders, pentesters and developers — all in one place. Learn more about how the world of App- and InfoSec is changing every day.</description>
    <language>en</language>
    <pubDate>Mon, 13 Apr 2026 17:40:52 GMT</pubDate>
    <dc:date>2026-04-13T17:40:52Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Mythos: The Ultimate Pentesting Tool?</title>
      <link>https://www.cobalt.io/blog/mythos-the-ultimate-pentesting-tool</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/mythos-the-ultimate-pentesting-tool" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/mythos.png" alt="Mythos: The Ultimate Pentesting Tool?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;When I first read what Mythos was capable of, it was clear we’ve reached an inflection point sooner than expected. Anthropic has demonstrated something the industry can’t ignore: vulnerability discovery has scaled beyond human constraints. It can identify and exploit vulnerabilities at a level that was previously impractical. And more impressive is the fact that Mythos was not trained to be a hacker. These offensive capabilities are a “downstream consequence” of improved reasoning and autonomy. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/mythos-the-ultimate-pentesting-tool" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/mythos.png" alt="Mythos: The Ultimate Pentesting Tool?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;When I first read what Mythos was capable of, it was clear we’ve reached an inflection point sooner than expected. Anthropic has demonstrated something the industry can’t ignore: vulnerability discovery has scaled beyond human constraints. It can identify and exploit vulnerabilities at a level that was previously impractical. And more impressive is the fact that Mythos was not trained to be a hacker. These offensive capabilities are a “downstream consequence” of improved reasoning and autonomy. &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fmythos-the-ultimate-pentesting-tool&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity Insights</category>
      <pubDate>Mon, 13 Apr 2026 17:40:52 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/mythos-the-ultimate-pentesting-tool</guid>
      <dc:date>2026-04-13T17:40:52Z</dc:date>
      <dc:creator>Sonali Shah</dc:creator>
    </item>
    <item>
      <title>Cobalt Pentester Spotlight — Orhan Yildirim</title>
      <link>https://www.cobalt.io/blog/cobalt-pentester-spotlight-orhan-yildirim</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/cobalt-pentester-spotlight-orhan-yildirim" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Orhan%20Yildirim%20Pentester%20Spotlight.png" alt="Cobalt Pentester Spotlight — Orhan Yildirim" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we share their experiences, background, and insights into the world of an accomplished pentester.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/cobalt-pentester-spotlight-orhan-yildirim" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Orhan%20Yildirim%20Pentester%20Spotlight.png" alt="Cobalt Pentester Spotlight — Orhan Yildirim" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we share their experiences, background, and insights into the world of an accomplished pentester.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fcobalt-pentester-spotlight-orhan-yildirim&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cobalt Core</category>
      <pubDate>Thu, 02 Apr 2026 18:14:48 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/cobalt-pentester-spotlight-orhan-yildirim</guid>
      <dc:date>2026-04-02T18:14:48Z</dc:date>
      <dc:creator>Noelle Hori</dc:creator>
    </item>
    <item>
      <title>Moving from Annual VAPT to CTEM (Continuous Threat Exposure Management)</title>
      <link>https://www.cobalt.io/blog/moving-from-annual-vapt-to-ctem</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/moving-from-annual-vapt-to-ctem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Moving-from-Annual-VAPT-CTEM-%28Continuous-Threat-Exposure-Management%29.png" alt="Moving from Annual VAPT to CTEM (Continuous Threat Exposure Management)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The accelerating speed of AI-powered cyberattacks has made traditional vulnerability assessment and penetration testing (VAPT) inadequate as a standalone solution. Today’s continual bombardment of cyberattacks requires VAPT to be supplemented by a continuous threat exposure management (CTEM) approach to cybersecurity. In this guide, we’ll cover why CTEM has become necessary, how it fills security gaps undefended by VAPT, and how to implement a shift from VAPT to CTEM.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/moving-from-annual-vapt-to-ctem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Moving-from-Annual-VAPT-CTEM-%28Continuous-Threat-Exposure-Management%29.png" alt="Moving from Annual VAPT to CTEM (Continuous Threat Exposure Management)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The accelerating speed of AI-powered cyberattacks has made traditional vulnerability assessment and penetration testing (VAPT) inadequate as a standalone solution. Today’s continual bombardment of cyberattacks requires VAPT to be supplemented by a continuous threat exposure management (CTEM) approach to cybersecurity. In this guide, we’ll cover why CTEM has become necessary, how it fills security gaps undefended by VAPT, and how to implement a shift from VAPT to CTEM.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fmoving-from-annual-vapt-to-ctem&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Offensive Security</category>
      <pubDate>Wed, 25 Mar 2026 15:29:43 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/moving-from-annual-vapt-to-ctem</guid>
      <dc:date>2026-03-25T15:29:43Z</dc:date>
      <dc:creator>Joe Brinkley</dc:creator>
    </item>
    <item>
      <title>How Cobalt Is Harnessing a Decade of Pentest Data for Hyper-Automation</title>
      <link>https://www.cobalt.io/blog/how-cobalt-is-harnessing-a-decade-of-pentest-data-for-hyper-automation</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/how-cobalt-is-harnessing-a-decade-of-pentest-data-for-hyper-automation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/How%20Cobalt%20Is%20Harnessing%20a%20Decade%20of%20Pentest%20Data%20for%20Hyper-Automation.png" alt="How Cobalt Is Harnessing a Decade of Pentest Data for Hyper-Automation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;If your plan for securing a 40% larger attack surface this year is "work harder," you’ve already lost. We are living through a period of hyper-acceleration. Engineering teams ship code daily, and AI-generated code introduces complexity at unprecedented speed. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/how-cobalt-is-harnessing-a-decade-of-pentest-data-for-hyper-automation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/How%20Cobalt%20Is%20Harnessing%20a%20Decade%20of%20Pentest%20Data%20for%20Hyper-Automation.png" alt="How Cobalt Is Harnessing a Decade of Pentest Data for Hyper-Automation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;If your plan for securing a 40% larger attack surface this year is "work harder," you’ve already lost. We are living through a period of hyper-acceleration. Engineering teams ship code daily, and AI-generated code introduces complexity at unprecedented speed. &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fhow-cobalt-is-harnessing-a-decade-of-pentest-data-for-hyper-automation&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity Insights</category>
      <pubDate>Thu, 19 Mar 2026 11:00:00 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/how-cobalt-is-harnessing-a-decade-of-pentest-data-for-hyper-automation</guid>
      <dc:date>2026-03-19T11:00:00Z</dc:date>
      <dc:creator>Deepak Dalvi</dc:creator>
    </item>
    <item>
      <title>The Iranian Cyber Playbook: What Security Teams Should Expect</title>
      <link>https://www.cobalt.io/blog/the-iranian-cyber-playbook-what-security-teams-should-expect</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/the-iranian-cyber-playbook-what-security-teams-should-expect" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Iran%20Blog.png" alt="The Iranian Cyber Playbook: What Security Teams Should Expect" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;It’s a common misconception that geopolitical crises stay confined to the physical battlefields. If all of the action is overseas, it can’t possibly impact us over here, right? Absolutely wrong. They spill into cyberspace, where state-aligned actors test defenses, probe infrastructure, and exploit organizations that are slow to adapt.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/the-iranian-cyber-playbook-what-security-teams-should-expect" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Iran%20Blog.png" alt="The Iranian Cyber Playbook: What Security Teams Should Expect" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;It’s a common misconception that geopolitical crises stay confined to the physical battlefields. If all of the action is overseas, it can’t possibly impact us over here, right? Absolutely wrong. They spill into cyberspace, where state-aligned actors test defenses, probe infrastructure, and exploit organizations that are slow to adapt.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fthe-iranian-cyber-playbook-what-security-teams-should-expect&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity Insights</category>
      <pubDate>Tue, 17 Mar 2026 23:01:29 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/the-iranian-cyber-playbook-what-security-teams-should-expect</guid>
      <dc:date>2026-03-17T23:01:29Z</dc:date>
      <dc:creator>Joe Brinkley</dc:creator>
    </item>
    <item>
      <title>Breaking In, Breaking Through: Q&amp;A With Women in Offensive Security</title>
      <link>https://www.cobalt.io/blog/breaking-in-breaking-through-qa-with-women-in-offensive-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/breaking-in-breaking-through-qa-with-women-in-offensive-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Blog%20Banner%20%281%29.png" alt="Breaking In, Breaking Through: Q&amp;amp;A With Women in Offensive Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cybersecurity is built on curiosity, persistence, and a willingness to challenge how things work. Nowhere is that more evident than in offensive security, where thinking differently is essential.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/breaking-in-breaking-through-qa-with-women-in-offensive-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Blog%20Banner%20%281%29.png" alt="Breaking In, Breaking Through: Q&amp;amp;A With Women in Offensive Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cybersecurity is built on curiosity, persistence, and a willingness to challenge how things work. Nowhere is that more evident than in offensive security, where thinking differently is essential.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fbreaking-in-breaking-through-qa-with-women-in-offensive-security&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cobalt Core</category>
      <pubDate>Tue, 17 Mar 2026 19:46:26 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/breaking-in-breaking-through-qa-with-women-in-offensive-security</guid>
      <dc:date>2026-03-17T19:46:26Z</dc:date>
      <dc:creator>Cobalt</dc:creator>
    </item>
    <item>
      <title>Cobalt Pentester Spotlight — Krishna Sai Nuthakki</title>
      <link>https://www.cobalt.io/blog/cobalt-pentester-spotlight-krishna-sai-nuthakki</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/cobalt-pentester-spotlight-krishna-sai-nuthakki" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Krishna%20Sai%20Nuthakki%20Pentester%20Spotlight.png" alt="Cobalt Pentester Spotlight — Krishna Sai Nuthakki" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we share their experiences, background, and insights into the world of an accomplished pentester.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/cobalt-pentester-spotlight-krishna-sai-nuthakki" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Krishna%20Sai%20Nuthakki%20Pentester%20Spotlight.png" alt="Cobalt Pentester Spotlight — Krishna Sai Nuthakki" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we share their experiences, background, and insights into the world of an accomplished pentester.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fcobalt-pentester-spotlight-krishna-sai-nuthakki&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cobalt Core</category>
      <pubDate>Fri, 13 Mar 2026 19:59:32 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/cobalt-pentester-spotlight-krishna-sai-nuthakki</guid>
      <dc:date>2026-03-13T19:59:32Z</dc:date>
      <dc:creator>Noelle Hori</dc:creator>
    </item>
    <item>
      <title>ADCS-ESC1: Misconfigured Certificate Templates Leading to Full Domain Compromise</title>
      <link>https://www.cobalt.io/blog/adcs-esc1-misconfigured-certificate-templates-leading-to-full-domain-compromise</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/adcs-esc1-misconfigured-certificate-templates-leading-to-full-domain-compromise" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/ADCS-ESC1.png" alt="ADCS-ESC1: Misconfigured Certificate Templates Leading to Full Domain Compromise" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Executive Summary&lt;/h2&gt; 
&lt;p&gt;Active Directory Certificate Services (ADCS) ESC1 is a critical misconfiguration that allows attackers with low-privileged domain credentials to escalate to Domain Administrator. This vulnerability exists when certificate templates are improperly configured, allowing users to request certificates on behalf of any domain account, including administrators.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/adcs-esc1-misconfigured-certificate-templates-leading-to-full-domain-compromise" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/ADCS-ESC1.png" alt="ADCS-ESC1: Misconfigured Certificate Templates Leading to Full Domain Compromise" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Executive Summary&lt;/h2&gt; 
&lt;p&gt;Active Directory Certificate Services (ADCS) ESC1 is a critical misconfiguration that allows attackers with low-privileged domain credentials to escalate to Domain Administrator. This vulnerability exists when certificate templates are improperly configured, allowing users to request certificates on behalf of any domain account, including administrators.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fadcs-esc1-misconfigured-certificate-templates-leading-to-full-domain-compromise&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cobalt Core</category>
      <pubDate>Thu, 12 Mar 2026 20:56:16 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/adcs-esc1-misconfigured-certificate-templates-leading-to-full-domain-compromise</guid>
      <dc:date>2026-03-12T20:56:16Z</dc:date>
      <dc:creator>GhostShift</dc:creator>
    </item>
    <item>
      <title>Where Claude’s Security Scanning Falls Short (and Why That's Okay)</title>
      <link>https://www.cobalt.io/blog/where-claudes-security-scanning-falls-short-and-why-thats-okay</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/where-claudes-security-scanning-falls-short-and-why-thats-okay" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Claude%20Blog%20Banner.png" alt="Where Claude’s Security Scanning Falls Short (and Why That's Okay)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Across the security industry, we’re seeing the effects of advances in AI technology, and Claude Code Security's recent announcement&amp;nbsp;is no exception. The market, as volatile as it is these days, seems to think this is a turning point—as we saw several major SaaS security stocks tank on the date of Anthropic’s announcement.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/where-claudes-security-scanning-falls-short-and-why-thats-okay" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/Claude%20Blog%20Banner.png" alt="Where Claude’s Security Scanning Falls Short (and Why That's Okay)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Across the security industry, we’re seeing the effects of advances in AI technology, and Claude Code Security's recent announcement&amp;nbsp;is no exception. The market, as volatile as it is these days, seems to think this is a turning point—as we saw several major SaaS security stocks tank on the date of Anthropic’s announcement.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fwhere-claudes-security-scanning-falls-short-and-why-thats-okay&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity Insights</category>
      <pubDate>Tue, 10 Mar 2026 19:48:52 GMT</pubDate>
      <author>willa.riggins@cobalt.io (Willa Riggins)</author>
      <guid>https://www.cobalt.io/blog/where-claudes-security-scanning-falls-short-and-why-thats-okay</guid>
      <dc:date>2026-03-10T19:48:52Z</dc:date>
    </item>
    <item>
      <title>What to Expect from Cobalt at RSAC 2026</title>
      <link>https://www.cobalt.io/blog/what-to-expect-from-cobalt-at-rsa-conference-2026</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/what-to-expect-from-cobalt-at-rsa-conference-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/RSAC%20Blog.png" alt="What to Expect from Cobalt at RSAC 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;It’s that time of the year again. The city, the people, the events, the discussions, and the innovative technology that’s bringing the cybersecurity community together once again for another fantastic event. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cobalt.io/blog/what-to-expect-from-cobalt-at-rsa-conference-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cobalt.io/hubfs/RSAC%20Blog.png" alt="What to Expect from Cobalt at RSAC 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;It’s that time of the year again. The city, the people, the events, the discussions, and the innovative technology that’s bringing the cybersecurity community together once again for another fantastic event. &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2689945&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cobalt.io%2Fblog%2Fwhat-to-expect-from-cobalt-at-rsa-conference-2026&amp;amp;bu=https%253A%252F%252Fwww.cobalt.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Events</category>
      <pubDate>Mon, 09 Mar 2026 19:43:49 GMT</pubDate>
      <guid>https://www.cobalt.io/blog/what-to-expect-from-cobalt-at-rsa-conference-2026</guid>
      <dc:date>2026-03-09T19:43:49Z</dc:date>
      <dc:creator>Lisa Matherly</dc:creator>
    </item>
  </channel>
</rss>
