WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise
WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

LLM Overreliance: What It Is and How to Prevent

October 3, 2024
Est Read Time: 5 min
Even back in Episode V, C3PO expected R2D2 to know better than to trust a strange computer, but nearly half a century...
AI Pentesting

When Generative AI Goes Wrong: Security Lessons from 8 Top Artificial Intelligence Incidents

October 2, 2024
Est Read Time: 9 min
Like any major technology, generative AI holds both promise of great benefits and potential for great risks. As...

Anonymous FTP Servers: How to Prevent Compromising Your Security

October 1, 2024
Est Read Time: 5 min
Anonymous FTP servers represent a legacy technology, but they remain in use, and their security vulnerabilities remain...
Cybersecurity Insights

Insecure Plugin Design in LLMs: Prevention Strategies

September 26, 2024
Est Read Time: 5 min
Insecure plugin design in language learning models enables attackers to automatically launch malicious requests. This...
AI Pentesting

Introducing Sonali Shah, Cobalt’s New CEO

September 25, 2024
Est Read Time: 3 min
On August 28th, 2024, Cobalt announced the appointment of Sonali Shah as its new Chief Executive Officer. With an...
Life at Cobalt

Pentester Guide: Weak or Default Credentials

September 24, 2024
Est Read Time: 4 min
Weak or default credentials are a common security flaw that attackers can exploit with minimal effort. They often lead...
Pentester Guides

Using AI for Offensive Security: Executive Report Summary

September 19, 2024
Est Read Time: 6 min
The Cloud Security Alliance (CSA) has released an important new report on Using AI for Offensive Security. The report...
AI Pentesting

Pentesting vs Bug Bounty: Which is Better for Your Company's Security?

September 18, 2024
Est Read Time: 7 min
Penetration testing (pentesting) and bug bounty programs (bug bounties) are a common part of companies' cybersecurity...
Modernizing Pentesting

LLM Supply Chain Attack: Prevention Strategies

September 16, 2024
Est Read Time: 6 min
LLM supply chain attack vulnerabilities have emerged as a top risk for machine learning models. Third-party training...
AI Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.