REPORT
The 25x Remediation Gap: See how elite security teams resolve risks in 10 days vs. 249
REPORT
The 25x Remediation Gap: See how elite security teams resolve risks in 10 days vs. 249

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Cyber Kill Chain: Understanding How Cyberattacks Happen

December 4, 2024
Est Read Time: 6 min
The Cyber Kill Chain provides a framework for analyzing cyberattacks and developing defenses. Originally developed by...
Modernizing Pentesting

Smart Contract Security Risks: Today's 10 Top Vulnerabilities and Mitigations

December 3, 2024
Est Read Time: 6 min
Smart contracts make it easier to execute digital agreements, but they can introduce security risks that compromise...
Cybersecurity Insights

Node.js Vulnerabilities: Securing against Common Risks

December 2, 2024
Est Read Time: 10 min
The Node.js runtime environment not only accelerates JavaScript applications and supports scalability, but it also...
Vulnerabilities

Ensuring Safe and Equitable Advancements in AI

November 29, 2024
Est Read Time: 2 min
When we think about technological advancements, it’s easy to focus on the "wow" factor. Cutting-edge tools, sleek...
AI Pentesting

Pentester Spotlight: Harshit Sengar

November 28, 2024
Est Read Time: 5 min
The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Cobalt Core

A Deep Dive into Broken Functionality Level Authorization Vulnerability (BFLA)

November 27, 2024
Est Read Time: 7 min
What is Broken Functionality Level Authorization? Broken Functionality Level Authorization (BFLA) is a security flaw...
Vulnerabilities

It’s a Three-Peat! Cobalt Named “Outperformer” for the Third Year Running in GigaOm’s Radar Report for PTaaS

November 22, 2024
Est Read Time: 5 min
What is it about winning something three years in a row that is so difficult? Almost all of the teams and individuals...
Modernizing Pentesting

A Breakdown of E-Mail Security

November 21, 2024
Est Read Time: 6 min
Email has become an essential communication tool, but with its rise, so have email-based threats. From phishing scams...
Vulnerabilities

Empowering Security and Compliance: How Cobalt and Vanta’s Integration Streamlines Vulnerability Management

November 13, 2024
Est Read Time: 2 min
In today's rapidly evolving tech landscape, security and compliance are non-negotiable for growing companies. As...
Partners

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.