PTaaS Checklist
Don't just "check the box". Learn 7 factors that will ensure your next pentest is a strategic advantage for your business.
PTaaS Checklist
Don't just "check the box". Learn 7 factors that will ensure your next pentest is a strategic advantage for your business.

Gisela Hinojosa

Gisela Hinojosa is a Senior Security Consultant at Cobalt with over 5 years of experience as a penetration tester. Gisela performs a wide range of penetration tests including, network, web application, mobile application, Internet of Things (IoT), red teaming, phishing and threat modeling with STRIDE. Gisela currently holds the Security+, GMOB, GPEN and GPWAT certifications.

Anonymous FTP Servers: How to Prevent Compromising Your Security

Anonymous FTP servers represent a legacy technology, but they remain in use, and their security vulnerabilities remain...
Oct 1, 2024
Est Read Time: 5 min

Insecure Plugin Design in LLMs: Prevention Strategies

Insecure plugin design in language learning models enables attackers to automatically launch malicious requests. This...
Sep 26, 2024
Est Read Time: 5 min

What is an Attack Vector? Defending against 23 Common Attack Vectors

Attack vector management forms the foundation for effective cybersecurity. Understanding the attack vectors that...
Sep 9, 2024
Est Read Time: 14 min

NIST Releases First Post-Quantum Encryption Standards

The National Institute of Standards and Technology (NIST) has released the first finalized standards for post-quantum...
Sep 3, 2024
Est Read Time: 3 min

Lessons Learned from the MGM Breach

The recent arrest of a teenager linked to last year's MGM cyberattack is a stark reminder that no organization,...
Aug 5, 2024
Est Read Time: 4 min

How Digital Risk Assessments Can Protect Your Business from the RockYou2024 Password Leak

On July 4th, 2024, a hacker posted a file named "rockyou2024.txt" on a popular hacking forum, containing 9.9 billion...
Jul 15, 2024
Est Read Time: 2 min

FDA cybersecurity guidance summarized

The U.S. Food and Drug Administration (FDA) recently issued updated guidance for cybersecurity in medical devices. The...
Jun 21, 2024
Est Read Time: 5 min

From Open Sources to Open Secrets: Largest Security Breaches Caused by Open Source Intelligence (OSINT) Oversights

Open Source Intelligence (OSINT) is an essential step for cybersecurity professionals. It enables them to gather...
Apr 19, 2024
Est Read Time: 7 min

Top Open Source Intelligence Tools & Techniques

Open source intelligence (OSINT) is a cornerstone of cybersecurity and penetration testing. As our digital footprints...
Apr 12, 2024
Est Read Time: 9 min
    1 2 3