WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentester Spotlight: Alex Vaida

October 16, 2024
Est Read Time: 3 min
The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Cobalt Core

20 Types of Social Engineering Attacks Targeting Small Businesses

October 15, 2024
Est Read Time: 7 min
Social engineering attacks represent one of today's biggest cybersecurity risks, currently ranking as the second most...
Cybersecurity Insights

Top 40 AI Cybersecurity Statistics

October 10, 2024
Est Read Time: 8 min
The latest AI cybersecurity statistics show an increase in artificial intelligence to power phishing, ransomware...
AI Pentesting

G2 Names Cobalt a Leader for Fall 2024

October 10, 2024
Est Read Time: 2 min
We are proud to announce that Cobalt has achieved multiple badges for the Fall 2024 Report by G2, the world’s largest...
Awards

A Pentester Guide to LDAP Bind Method Vulnerabilities

October 9, 2024
Est Read Time: 6 min
Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
Vulnerabilities

Revealing AI Risks in Cybersecurity: Key Insights from the AI Risk Repository

October 9, 2024
Est Read Time: 4 min
The rise of artificial intelligence (AI) has transformed cybersecurity, offering advanced tools to detect and prevent...
Cybersecurity Insights

15 Cybersecurity Influencers to Follow: Cybersecurity Awareness Month

October 7, 2024
Est Read Time: 6 min
October is Cybersecurity Awareness Month, a perfect time to learn from the brightest minds in the field.
Cybersecurity Insights

Think Like an Attacker: Using OSINT to Safeguard Your Organization

October 4, 2024
Est Read Time: 5 min
In the cybersecurity world, knowledge is power. Threat actors have become increasingly adept at using Open-Source...
Vulnerabilities

LLM Overreliance: What It Is and How to Prevent

October 3, 2024
Est Read Time: 5 min
Even back in Episode V, C3PO expected R2D2 to know better than to trust a strange computer, but nearly half a century...
AI Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.