PTaaS Checklist
Don't just "check the box". Learn 7 factors that will ensure your next pentest is a strategic advantage for your business.
PTaaS Checklist
Don't just "check the box". Learn 7 factors that will ensure your next pentest is a strategic advantage for your business.

Overcoming Cybersecurity Challenges with Offensive Security Solutions

How do you do more with less in cybersecurity where you must constantly stay one step ahead of attackers? The easy...

Pentester Spotlight: Arben Shala

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Feb 14, 2025
Est Read Time: 6 min

Cobalt Empowers Insurity's Strategic Security

Many organizations approach pentesting with a reactive, ad hoc mindset, conducting tests only when a specific need...
Feb 13, 2025
Est Read Time: 1 min

Top 6 API Pentesting Tools

API pentesting tools have become critical for cybersecurity. APIs play a crucial role in the finance, retail, and...
Feb 11, 2025
Est Read Time: 5 min

LLM System Prompt Leakage: Prevention Strategies

LLM system prompt leakage represents an important addition to the Open Worldwide Application Security Project (OWASP)...
Feb 3, 2025
Est Read Time: 4 min

Small Issues, Big Impact: Security Testing Lessons from Kerio Control

In the cybersecurity industry, it’s easy to get caught up in chasing flashy zero-days or high-severity CVEs. But...
Jan 30, 2025
Est Read Time: 4 min

Get to know Gunter Ollmann

On January 29th, 2025 Cobalt named the appointment of Gunter Ollmann as its new Chief Technology Officer (CTO). With...
Jan 29, 2025
Est Read Time: 2 min

New Year Evaluation: Best Practices for Pentesting

As the year starts, an organization should assess its cyber posture while ensuring its pentesting measures are on par....
Jan 23, 2025
Est Read Time: 4 min

Hunting Common Misconfigurations in Electron Apps - Part 1

Electron apps have transformed desktop development by combining technologies with Node.js and Chromium. However, with...
Jan 17, 2025
Est Read Time: 7 min

2023 Top Routinely Exploited Vulnerabilities: Zero-day Exploits on the Rise

The 2023 Top Routinely Exploited Vulnerabilities Joint Cybersecurity Advisory has been released by the Five Eyes...
Jan 17, 2025
Est Read Time: 6 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.