GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Looking Back on Our 2024 Azores CAB

This year's Customer Advisory Board (CAB) meeting was nothing short of extraordinary. Set in the breathtaking Azores,...
Oct 24, 2024
Est Read Time: 2 min

How Attackers Bypass Office 365 MFA Checks: What Pentesters Need to Know

Vulnerabilities enable hackers to bypass Office 365 multi-factor authentication checks. Bad actors can use various...
Oct 21, 2024
Est Read Time: 7 min

Why Visibility is an Essential Component of Your Application Security Approach

It’s funny how, over time, we accumulate knowledge that we encapsulate in a short phrase and then repeat it to each...
Oct 17, 2024
Est Read Time: 2 min

Pentester Spotlight: Alex Vaida

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Oct 16, 2024
Est Read Time: 3 min

20 Types of Social Engineering Attacks Targeting Small Businesses

Social engineering attacks represent one of today's biggest cybersecurity risks, currently ranking as the second most...
Oct 15, 2024
Est Read Time: 7 min

Top 40 AI Cybersecurity Statistics

The latest AI cybersecurity statistics show an increase in artificial intelligence to power phishing, ransomware...
Oct 10, 2024
Est Read Time: 8 min

G2 Names Cobalt a Leader for Fall 2024

We are proud to announce that Cobalt has achieved multiple badges for the Fall 2024 Report by G2, the world’s largest...
Oct 10, 2024
Est Read Time: 2 min

A Pentester Guide to LDAP Bind Method Vulnerabilities

Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
Oct 9, 2024
Est Read Time: 6 min

Revealing AI Risks in Cybersecurity: Key Insights from the AI Risk Repository

The rise of artificial intelligence (AI) has transformed cybersecurity, offering advanced tools to detect and prevent...
Oct 9, 2024
Est Read Time: 4 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.