EXEC WEBINAR
Join Cobalt CTO Gunter Ollmann to learn the 90% Rule for Securing AI Ecosystems
EXEC WEBINAR
Join Cobalt CTO Gunter Ollmann to learn the 90% Rule for Securing AI Ecosystems

Gisela Hinojosa

Gisela Hinojosa is a Senior Security Consultant at Cobalt with over 5 years of experience as a penetration tester. Gisela performs a wide range of penetration tests including, network, web application, mobile application, Internet of Things (IoT), red teaming, phishing and threat modeling with STRIDE. Gisela currently holds the Security+, GMOB, GPEN and GPWAT certifications.

LLM System Prompt Leakage: Prevention Strategies

LLM system prompt leakage represents an important addition to the Open Worldwide Application Security Project (OWASP)...
Feb 3, 2025
Est Read Time: 4 min

Less Findings in your Pentest? Measuring the Effectiveness of a Penetration Test

Have you been doing pentesting for a while and getting fewer and fewer findings or fewer high-severity findings? Is it...
Jan 6, 2025
Est Read Time: 6 min

What Is Baiting in Cybersecurity: Definition, Examples, and Mitigations

Baiting represents one of the oldest scams on the Internet, but it remains one of the most common because of its...
Dec 27, 2024
Est Read Time: 4 min

What is Secure SDLC (SSDLC)? Integrating Cybersecurity into Your Software Development Lifecycle

A secure software development lifecycle strategy builds cybersecurity into program design instead of treating security...
Nov 12, 2024
Est Read Time: 8 min

Beyond the Perimeter: Exploring the Modern Attack Surface

Attack surface analysis is critical in securing your infrastructure and providing insight into potential ways intruders...
Oct 28, 2024
Est Read Time: 3 min

A Pentester Guide to LDAP Bind Method Vulnerabilities

Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
Oct 9, 2024
Est Read Time: 6 min

Revealing AI Risks in Cybersecurity: Key Insights from the AI Risk Repository

The rise of artificial intelligence (AI) has transformed cybersecurity, offering advanced tools to detect and prevent...
Oct 9, 2024
Est Read Time: 4 min

Anonymous FTP Servers: How to Prevent Compromising Your Security

Anonymous FTP servers represent a legacy technology, but they remain in use, and their security vulnerabilities remain...
Oct 1, 2024
Est Read Time: 5 min

Insecure Plugin Design in LLMs: Prevention Strategies

Insecure plugin design in language learning models enables attackers to automatically launch malicious requests. This...
Sep 26, 2024
Est Read Time: 5 min
    1 2 3