WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar

Vulnerabilities (6)

Red Teaming vs. Pentesting

November 21, 2022
Est Read Time: 2 min
Core Pentester Saad Nasir writes about what the difference between red teaming and pentesting is based on his own experiences. Saad is a Pentester in Cobalt's Core and on the Red Team at SolarWinds.
Cobalt Core Vulnerabilities

PTaaS Roadshow Recap: Into the Hacker’s Mind

November 18, 2022
Est Read Time: 5 min
Cobalt Core members Vanessa Sauter, Derek Carlin, and Andreea Cristina Druga share insights on how to prepare for a pentest, what tools they use to stress test your assets, and the steps they take to check what vulnerabilities you’re susceptible to.
Cybersecurity Insights Vulnerabilities

Common Vulnerabilities in NodeJS Applications

November 18, 2022
Est Read Time: 7 min
Node.js is an open-source and cross-platform JavaScript runtime environment. Today we are going to look at 3 different vulnerabilities by analyzing the source code of an application and how you can detect and exploit them. 
Cobalt Core Vulnerabilities

Source Code Review

November 9, 2022
Est Read Time: 11 min
Are you checking your new products for vulnerabilities in all capacities? Ninad Mathpati shares what you need to be doing during your Source Code Review and what attackers look for.
Cobalt Core Vulnerabilities

The Guide to Understanding Content Security Policy (CSP) and Bypass Exploits

October 12, 2022
Est Read Time: 9 min
This blog post aims to demonstrate what CSP is and why CSP is implemented. And how attackers can bypass CSP. In this article, I will include how you can bypass some directives to achieve XSS on the target application.
Cobalt Core Vulnerabilities

Web Socket Vulnerabilites

September 27, 2022
Est Read Time: 9 min
WebSockets are an exciting technology that has been gaining traction in the industry. Many companies are using the technology, especially in their real-time services
Cobalt Core Web Application Pentesting Vulnerabilities

Secure Software Best Practices: Protect Against Server-Side Request Forgery

September 26, 2022
Est Read Time: 7 min
See examples of Server-Side Request Forgery (SSRF) exploitation, and learn how to minimize your risks.
Vulnerabilities

Secure Software Best Practices: Validate User Input

September 23, 2022
Est Read Time: 6 min
Protect your systems from bad user input. In this article, we share best practices to validate user input, securely.
Vulnerabilities

Secure Software Best Practices: Prevent Security Misconfigurations

September 21, 2022
Est Read Time: 4 min
Configure your software properly to avoid security issues.
Vulnerabilities
    4 5 6 7 8