WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar

Vulnerabilities (8)

Pentester Diaries Ep6: The Importance of Report Writing

June 24, 2021
Est Read Time: 18 min
Welcome back to Pentester Diaries. In this episode, longtime Core member and Cobalt Research Manager, Robert Kugler...
Vulnerabilities

Parameter Tampering Vulnerability Using 3 Different Approaches

June 21, 2021
Est Read Time: 4 min
With the growing number of online transactions increasing, it is clear that payment security is crucial. I have created...
Vulnerabilities

Getting Started with Android Application Security

June 7, 2021
Est Read Time: 13 min
Security has always been a major concern for businesses, and this concern is even greater when it comes to mobile...
Mobile Application Pentesting Vulnerabilities

Pentester Diaries Ep5: Understanding Severity Ratings

June 2, 2021
Est Read Time: 12 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Vulnerabilities

How to Write an Effective Pentest Report: Vulnerability Reports

May 17, 2021
Est Read Time: 9 min
The pentest process is not limited to executing various test cases to identify security vulnerabilities. It is a...
Vulnerabilities

Pentester Diaries Ep4: Beyond Security Hygiene

May 12, 2021
Est Read Time: 15 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Vulnerabilities

Anatomy of the Session Management Tests

March 19, 2021
Est Read Time: 6 min
Note: This article has been created in light of the OWASP standards and descriptions.
Cobalt Core Vulnerabilities

Pentester Diaries Ep1: Understanding Business Logic

March 11, 2021
Est Read Time: 22 min
We are excited to share the first episode of a new podcast series, Pentester Diaries.
Vulnerabilities

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

March 2, 2021
Est Read Time: 6 min
Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Vulnerabilities