GET STARTED
Need to fast-track your pentesting? Our experts make it easy.
GET STARTED
Need to fast-track your pentesting? Our experts make it easy.

Community

Introduction to Access Control Vulnerabilities

What is Access Control? Access Control plays a pivotal role in performing a penetration test.
Sep 14, 2023
Est Read Time: 8 min

Part 3: Learning iOS App Pentesting and Application Security with Real-World Case Studies

Welcome to part three of a blog series on iOS Application Security, where we delve into real-world case studies to...
Sep 5, 2023
Est Read Time: 7 min

Pentester Spotlight: Armaan Pathan

Armaan Pathan, a passionate cybersecurity professional, joined Cobalt's Core team in 2019 after being involved with the company during its bug bounty program phase. With a focus on identifying security flaws rather than building applications, Armaan has extensive experience in penetration testing and web application testing. He is dedicated to continuous learning, staying ahead of emerging threats, and providing comprehensive reports and strategic recommendations to clients.
Jun 29, 2023
Est Read Time: 3 min

iOS App Pentesting and Security with Real-World Case Studies Part 2

In part 2 of our IOS pentesting series, we will explore two additional case studies. One of them is about a ride-sharing app, and the other is about an E-commerce app. These case studies highlight the risks associated with insecure practices in iOS app development, such as hardcoding credentials and the exploitation of third-party libraries, emphasizing the importance of secure coding, data storage, and access control measures.
Jun 26, 2023
Est Read Time: 3 min

Learning iOS App Pentesting and Security Part 1

This blog is a three-part series focused on iOS app penetration testing. Swaroop Yermalkar, who is a Core Penetration Tester, shares their experiences and knowledge in various types of pentesting, including mobile app security. The blog aims to provide a comprehensive guide to improving knowledge of iOS security and penetration testing methodologies through real-world case studies.
Jun 13, 2023
Est Read Time: 5 min

Pentester Spotlight: Furkan Senan; Computer Enthusiast to Lead Tester

From an early age, Furkan Senan was immersed in the world of computers, with a Pentium II CPU and dial-up internet as his constant companion. His insatiable curiosity led him to cybersecurity at the age of 12, where he and his friends explored hacking software. This discovery became a turning point in his life, and he embarked on a journey into the realm of pentesting.
Jun 1, 2023
Est Read Time: 3 min

Video: AWAE/OSWE For Humans

This blog is a personal account from Reando Veshi of preparing for and taking the OSWE (Advanced Web Attacks and Exploitation) exam. Reando shares his experience along with tips that helped him in his journey.
May 30, 2023
Est Read Time: 6 min

A Pentester's Guide to Source Code Review

This blog post guides how to conduct a source code review project, focusing on advice for those new to the task. The post covers the purpose of a source code review, the process for conducting one, and the information needed to conduct a proper assessment.
May 15, 2023
Est Read Time: 17 min

SecurityBoat: A Cybersecurity Company Fostering Collaboration and Community Awareness

Ninad Mathpati is the founder and CEO of SecurityBoat, a cybersecurity consultancy that offers vulnerability assessments, penetration testing, compliance assistance, and security consultation to help clients identify and mitigate security risks. The company also promotes cybersecurity awareness through its Non-Profit Cybersecurity community group, SB Meetup, offering a platform for knowledge-sharing and networking.
May 11, 2023
Est Read Time: 3 min
    1 2 3 4 5