WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Vulnerabilities (8)

Pentester Diaries Ep6: The Importance of Report Writing

June 24, 2021
Est Read Time: 18 min
Welcome back to Pentester Diaries. In this episode, longtime Core member and Cobalt Research Manager, Robert Kugler...
Vulnerabilities

Parameter Tampering Vulnerability Using 3 Different Approaches

June 21, 2021
Est Read Time: 4 min
With the growing number of online transactions increasing, it is clear that payment security is crucial. I have created...
Vulnerabilities

Getting Started with Android Application Security

June 7, 2021
Est Read Time: 13 min
Security has always been a major concern for businesses, and this concern is even greater when it comes to mobile...
Mobile Application Pentesting Vulnerabilities

Pentester Diaries Ep5: Understanding Severity Ratings

June 2, 2021
Est Read Time: 12 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Vulnerabilities

How to Write an Effective Pentest Report: Vulnerability Reports

May 17, 2021
Est Read Time: 9 min
The pentest process is not limited to executing various test cases to identify security vulnerabilities. It is a...
Vulnerabilities

Pentester Diaries Ep4: Beyond Security Hygiene

May 12, 2021
Est Read Time: 15 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Vulnerabilities

Anatomy of the Session Management Tests

March 19, 2021
Est Read Time: 6 min
Note: This article has been created in light of the OWASP standards and descriptions.
Cobalt Core Vulnerabilities

Pentester Diaries Ep1: Understanding Business Logic

March 11, 2021
Est Read Time: 22 min
We are excited to share the first episode of a new podcast series, Pentester Diaries.
Vulnerabilities

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

March 2, 2021
Est Read Time: 6 min
Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Vulnerabilities