WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.
WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.

Gisela Hinojosa

Gisela Hinojosa is a Senior Security Consultant at Cobalt with over 5 years of experience as a penetration tester. Gisela performs a wide range of penetration tests including, network, web application, mobile application, Internet of Things (IoT), red teaming, phishing and threat modeling with STRIDE. Gisela currently holds the Security+, GMOB, GPEN and GPWAT certifications.

New HIPAA Regulations for 2025: Security Updates You Need to Know

Until now, Health Insurance Portability and Accountability Act (HIPAA) security regulations have permitted...
Apr 11, 2025
Est Read Time: 6 min

Speak the Language of Security: 20 Essential Hacking Terminologies

Knowing hacking terminologies forms a foundation for effective cybersecurity by making it easier to research security...
Feb 27, 2025
Est Read Time: 8 min

Top 6 API Pentesting Tools

API pentesting tools have become critical for cybersecurity. APIs play a crucial role in the finance, retail, and...
Feb 11, 2025
Est Read Time: 5 min

LLM System Prompt Leakage: Prevention Strategies

LLM system prompt leakage represents an important addition to the Open Worldwide Application Security Project (OWASP)...
Feb 3, 2025
Est Read Time: 5 min

Less Findings in your Pentest? Measuring the Effectiveness of a Penetration Test

Have you been doing pentesting for a while and getting fewer and fewer findings or fewer high-severity findings? Is it...
Jan 6, 2025
Est Read Time: 6 min

What Is Baiting in Cybersecurity: Definition, Examples, and Mitigations

Baiting represents one of the oldest scams on the Internet, but it remains one of the most common because of its...
Dec 27, 2024
Est Read Time: 4 min

What is Secure SDLC (SSDLC)? Integrating Cybersecurity into Your Software Development Lifecycle

A secure software development lifecycle strategy builds cybersecurity into program design instead of treating security...
Nov 12, 2024
Est Read Time: 8 min

Beyond the Perimeter: Exploring the Modern Attack Surface

Attack surface analysis is critical in securing your infrastructure and providing insight into potential ways intruders...
Oct 28, 2024
Est Read Time: 3 min

A Pentester Guide to LDAP Bind Method Vulnerabilities

Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
Oct 9, 2024
Est Read Time: 6 min
    1 2 3