GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Exploiting Buffer Overflow Vulnerabilities: A Step-by-Step Guide (Part 2)

Buffer overflow vulnerability happens when data written to a buffer exceeds its size, which may overwrite important data or execute malicious code. Attackers can exploit these vulnerabilities to gain unauthorized access, execute malicious code, or steal sensitive data. This blog will provide an overview of buffer overflow exploitation, including its causes, consequences, and the methods attackers use to exploit it. It's important to understand the basics before diving into exploitation and steps of buffer overflow.
Apr 24, 2023
Est Read Time: 18 min

The Top 20 Penetration Testing Tools for Cybersecurity in 2023

To combat the growing number of sophisticated cyber threats, security professionals must stay up-to-date with the...
Apr 21, 2023
Est Read Time: 7 min

Hacker Corner Episode 2: Managing a Community of 400+ Hackers

On this episode of Hacker Corner, host Sheeraz Ali sits down with Community Manager Elizabeth Ramirez to talk about managing a community of 400+ hackers.
Apr 19, 2023
Est Read Time: 3 min

A Pentester’s Guide to Dependency Confusion Attacks

This blog post discusses the concept of "Dependency Confusion" in software development, where malicious code is injected into third-party dependencies, such as libraries or frameworks, that applications use.
Apr 17, 2023
Est Read Time: 7 min

The State of Pentesting 2023: How Operational Changes Can Jeopardize Security

The 2023 report taps into data from over 3,100 pentests we did in 2022, and 1,000 responses from security teams in the US, the UK, and Germany.
Apr 12, 2023
Est Read Time: 3 min

Cobalt Release Blog: March 2023

Read about the improvements we launched to our PtaaS Platform last month: aggregated risk, improved notifications, pentester peer feedback, and achievement stats.
Apr 11, 2023
Est Read Time: 1 min

Pentester of the Quarter: Shubham Chaskar

Cobalt is excited to announce that Shubham Chaskar is the Q2 Pentester of the Quarter!
Apr 10, 2023
Est Read Time: 1 min

CSRF & Bypasses

This article discusses Cross-Site Request Forgery (CSRF) attacks, a web security vulnerability where an attacker tricks an authenticated website user into performing an unwanted action, such as transferring funds or changing their email address, by exploiting the user's browser cookies. The article explains how CSRF attacks work and how attackers can bypass CSRF token validation to exploit vulnerabilities in web applications. It also discusses several techniques that can be used to bypass CSRF defense, including removing the referer header, bypassing the regex, and using different Content-Type values.
Apr 10, 2023
Est Read Time: 8 min

Meet Lisa Matherly Cobalt's New Chief Marketing Officer

This week Cobalt welcomed Lisa Matherly, as Chief Marketing Officer. With over two decades of experience in B2B...
Apr 5, 2023
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.