WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Cobalt Core (6)

Introduction to Serverless Vulnerabilities

Core Pentester Harsh Bothra introduces us to serverless vulnerabilities. He reviews the top 10 vulnerabilities and concludes with how to remediate them.
November 23, 2022
Est Read Time: 6 min

Red Teaming vs. Pentesting

Core Pentester Saad Nasir writes about what the difference between red teaming and pentesting is based on his own experiences. Saad is a Pentester in Cobalt's Core and on the Red Team at SolarWinds.
November 21, 2022
Est Read Time: 2 min

Common Vulnerabilities in NodeJS Applications

Node.js is an open-source and cross-platform JavaScript runtime environment. Today we are going to look at 3 different vulnerabilities by analyzing the source code of an application and how you can detect and exploit them. 
November 18, 2022
Est Read Time: 7 min

Source Code Review

Are you checking your new products for vulnerabilities in all capacities? Ninad Mathpati shares what you need to be doing during your Source Code Review and what attackers look for.
November 9, 2022
Est Read Time: 11 min

Pentesting Made Simple, an Italian Hacking Community

Core Pentester Reando Veshi has started his own hacking community in Italy: Pentesting Made Simple.
November 3, 2022
Est Read Time: 2 min

Pentester Feedback to Product Updates

Cobalt Core Pentesters can provide Cobalt's Product Team with direct feedback that is often translated into the platform. Director of Product, Mark Hamill, walks us through what that process looks like.
November 2, 2022
Est Read Time: 3 min

Pentester Spotlight: Alexis Fernández, Retired Developer takes on Pentesting

Alexis Fernandez has been a member of the Cobalt Core for a little over a year now. He started in security as a Web Developer before switching to ethical hacking.
October 26, 2022
Est Read Time: 3 min

What it means to be in the Cobalt Core

What does it mean to be in the Cobalt Core? I asked some of our Core Pentesters about their experiences in the Core and what has been most memorable for them.
October 18, 2022
Est Read Time: 4 min

The Guide to Understanding Content Security Policy (CSP) and Bypass Exploits

This blog post aims to demonstrate what CSP is and why CSP is implemented. And how attackers can bypass CSP. In this article, I will include how you can bypass some directives to achieve XSS on the target application.
October 12, 2022
Est Read Time: 9 min
    4 5 6 7 8