WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Cobalt Core (7)

2022 Pentester Spotlight Recaps

December 30, 2022
Est Read Time: 3 min
With 2023 just around the corner, we wanted to reflect on our Pentester Spotlights from this year. Our Pentester Spotlight series is focused on highlighting the Cobalt Core Pentesters and putting a face to their work
Cobalt Core

Pentester Spotlight: Saad Nasir

December 28, 2022
Est Read Time: 3 min
Saad Nasir has been a member of the Cobalt Core for a little over six months. He has contributed to Cobalt's content pieces and was recently featured on the Hacker Corner podcast.
Cobalt Core

All you need to know about JWT Pt. 2

December 26, 2022
Est Read Time: 13 min
Did you read our introductory blog on JSON tokens in November? Now time for a deeper dive into JSON Web Tokens, aka JWT. Core Pentester Ninad Mathpati expands on all things JWT.
Cobalt Core Vulnerabilities

Steampipe: Monitor Your Cloud Resources

December 21, 2022
Est Read Time: 8 min
Are you working in the cloud? If so, you can use an open-source tool named Steampipe to monitor your cloud infrastructure using SQL. One of Cobalt's Core Pentesters walks us through how Steampipe works in our latest Pentester Guide.
Cobalt Core Vulnerabilities

Introduction to Command Injection Vulnerability

December 14, 2022
Est Read Time: 8 min
We've covered code injection attacks in recent blogs, but do you happen to know about command injection attacks? Core Pentester Harsh Bothra walks us through the differences and covers all you need to know to protect yourself against command injection attacks.
Cobalt Core Vulnerabilities

Introducing Hacker Corner; Episode 1: Redteaming vs Pentesting Demystified

December 13, 2022
Est Read Time: 4 min
Introducing Hacker Corner! Hacker Corner is a podcast for hackers made by hackers. Join host Sheeraz Ali for episode one with guest Saad Nasir as they discuss redteaming vs. pentesting.
Cobalt Core

Hunting for Broken Link Hijacking (BLH)

December 7, 2022
Est Read Time: 4 min
How often are you checking to ensure there are no broken links on your webpage? If you aren't checking, attackers could be taking advantage using a broken link hijacking attack. Core Pentester Harsh Bothra writes about what scenarios to watch out for.
Cobalt Core Vulnerabilities

Then & Now: Sagar Parmar

December 6, 2022
Est Read Time: 3 min
Sagar Parmar has been a Cobalt Core Pentester for almost six years. He learned about Cobalt through another Core Pentester and loves how PtaaS has worked compared to bug bounty programs.
Cobalt Core

Pentester Spotlight: Razvan Ionescu, Romania's 3rd GIAC Security Expert

November 30, 2022
Est Read Time: 5 min
Razvan Ionescu has been pentesting with the Cobalt Core since 2018. He recently became a GIAC Security Expert, Romania's third. Read more about Razvan in his Pentester Spotlight.
Cobalt Core
    5 6 7 8 9