WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Cobalt Core (5)

Hacker Corner Episode 2: Managing a Community of 400+ Hackers

April 19, 2023
Est Read Time: 3 min
On this episode of Hacker Corner, host Sheeraz Ali sits down with Community Manager Elizabeth Ramirez to talk about managing a community of 400+ hackers.
Cobalt Core

A Pentester’s Guide to Dependency Confusion Attacks

April 17, 2023
Est Read Time: 7 min
This blog post discusses the concept of "Dependency Confusion" in software development, where malicious code is injected into third-party dependencies, such as libraries or frameworks, that applications use.
Cobalt Core Vulnerabilities

Pentester of the Quarter: Shubham Chaskar

April 10, 2023
Est Read Time: 1 min
Cobalt is excited to announce that Shubham Chaskar is the Q2 Pentester of the Quarter!
Cobalt Core

Dynamic Duo: Dhiraj Mishra & Zubin Devnani

April 5, 2023
Est Read Time: 2 min
Dhiraj Mishra and Zubin Devnani, two Core Pentesters, have led ten successful fuzzing workshops together and have plans to continue. Read about how they got started in our blog about the Dynamic Duo in the Core.
Cobalt Core

Pentester Spotlight: Herane Malhotra

March 26, 2023
Est Read Time: 2 min
This month's Pentester Spotlight features Herane Malhotra, a Core Pentester since 2021 and Lead.
Cobalt Core

OAuth Vulnerabilites Pt. 2

March 20, 2023
Est Read Time: 10 min
OAuth is a widely-used protocol that enables users to authorize third-party applications to access their data from other services, such as social media or cloud storage. However, like any technology, OAuth is not immune to vulnerabilities. This is Pt. 2 of a two-part series by Core Pentester Shubham Chaskar.
Cobalt Core Vulnerabilities

Active Directory Series: Active Directory Fundamentals

March 13, 2023
Est Read Time: 12 min
Active Directory is a Microsoft service that provides centralized management of user accounts, devices, and access to resources in a networked environment. It allows IT professionals to create and manage users, groups, computers, and other resources on a network, and control access to those resources based on policies and permissions.
Cobalt Core Vulnerabilities

Pentester’s Guide to XPATH Injection

February 27, 2023
Est Read Time: 6 min
XPath is a powerful language used to query and manipulate XML documents. It allows you to extract data, transform XML documents, query large datasets, and modify the structure and content of XML documents. XPath injection attacks occur when an attacker manipulates XPath statements to gain unauthorized access to sensitive data.
Cobalt Core Vulnerabilities

Pentester Spotlight: Goonjeta Malhotra

February 23, 2023
Est Read Time: 2 min
“Pentesting allowed me to challenge my skills and knowledge, to think of creative ways to exploit and identify vulnerabilities, and always to find ways to improve security posture." That's what Core Pentester Goonjeta Malhotra said about her journey into pentesting. Learn more about Goonjeta in here Pentester Spotlight.
Cobalt Core
    3 4 5 6 7