WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Think Like an Attacker: Using OSINT to Safeguard Your Organization

October 4, 2024
Est Read Time: 5 min
In the cybersecurity world, knowledge is power. Threat actors have become increasingly adept at using Open-Source...
Vulnerabilities

LLM Overreliance: What It Is and How to Prevent

October 3, 2024
Est Read Time: 5 min
Even back in Episode V, C3PO expected R2D2 to know better than to trust a strange computer, but nearly half a century...
AI Pentesting

When Generative AI Goes Wrong: Security Lessons from 8 Top Artificial Intelligence Incidents

October 2, 2024
Est Read Time: 9 min
Like any major technology, generative AI holds both promise of great benefits and potential for great risks. As...

Anonymous FTP Servers: How to Prevent Compromising Your Security

October 1, 2024
Est Read Time: 5 min
Anonymous FTP servers represent a legacy technology, but they remain in use, and their security vulnerabilities remain...
Cybersecurity Insights

Insecure Plugin Design in LLMs: Prevention Strategies

September 26, 2024
Est Read Time: 5 min
Insecure plugin design in language learning models enables attackers to automatically launch malicious requests. This...
AI Pentesting

Introducing Sonali Shah, Cobalt’s New CEO

September 25, 2024
Est Read Time: 3 min
On August 28th, 2024, Cobalt announced the appointment of Sonali Shah as its new Chief Executive Officer. With an...
Life at Cobalt

Pentester Guide: Weak or Default Credentials

September 24, 2024
Est Read Time: 4 min
Weak or default credentials are a common security flaw that attackers can exploit with minimal effort. They often lead...
Vulnerabilities

Using AI for Offensive Security: Executive Report Summary

September 19, 2024
Est Read Time: 6 min
The Cloud Security Alliance (CSA) has released an important new report on Using AI for Offensive Security. The report...
AI Pentesting

Pentesting vs Bug Bounty: Which is Better for Your Company's Security?

September 18, 2024
Est Read Time: 7 min
Penetration testing (pentesting) and bug bounty programs (bug bounties) are a common part of companies' cybersecurity...
Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.