WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
Modernizing Pentesting AI Pentesting

Four in a Row: Cobalt Earns Leader Spot in GigaOm Radar Report for PTaaS for 4th Straight Year

It's official—we are thrilled to be back for a fourth consecutive year as a Leader in the GigaOm Radar for Pentesting...

Hitting the GigaOm Bullseye: Why Modern PTaaS Looks Different in 2026

January 16, 2026
Est Read Time: 3 min
In November, not only was Cobalt named a Leader and a Fast Mover in the 2025 GigaOm Radar Report for Penetration...
Modernizing Pentesting Offensive Security

The Hidden Cost of Client-Side Convenience

January 14, 2026
Est Read Time: 5 min
Analysis revealed that Keycloak authentication artifacts (Access and ID tokens) are being serialized directly into the...
Cobalt Core

The Basics of Azure Pentesting: Creating a Free Azure Account and Utilizing Command Line

January 13, 2026
Est Read Time: 7 min
In Part 1, we covered an overview of Azure infrastructure and its core components. The second part of this series will...
Cobalt Core Cloud Security

Basics Of Azure Pentesting: Understanding Azure Structure and Its Known Components

January 9, 2026
Est Read Time: 5 min
In this blog series, we’ll cover the fundamentals of Azure pentesting, including the prerequisites needed from clients...
Cobalt Core Cloud Security

2026 Predictions: The Year AI Redraws the Security Map

December 17, 2025
Est Read Time: 2 min
As we move into 2026, one theme cuts through every corner of the cybersecurity landscape: AI isn’t just accelerating...
Cybersecurity Insights

Cobalt Earns 25 G2 Awards and Nine #1 Rankings in Winter 2026

December 16, 2025
Est Read Time: 2 min
When evaluating security partners, leaders increasingly look to G2, the industry’s largest and most trusted platform...
Awards Offensive Security

Top Cybersecurity Statistics for 2026

December 15, 2025
Est Read Time: 18 min
In last year’s cybersecurity statistics roundup, we saw that cybercrime costs were soaring and ransomware and phishing...
Cybersecurity Insights

Red Team Technique: Exploiting Git FSMonitor for Initial Access

December 8, 2025
Est Read Time: 3 min
Background In this post, we will demonstrate how Git's FSMonitor feature can be weaponized to achieve remote code...
Cobalt Core

Cobalt Pentester Spotlight - Sagar Parmar

December 3, 2025
Est Read Time: 8 min
The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Cobalt Core
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.