GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Deep Dive into GraphQL Pt. 2

Welcome to part two of GraphQL! Core Pentester Michael Adcock tackles our newest deep dive into the open-source data query.
Jan 9, 2023
Est Read Time: 6 min

2023 Q1 Pentester of the Quarter: Sanyam Chawla

Congratulations to Sanyam Chawla for winning the Pentester of the Quarter Award for Q1. Sanyam was nominated by his peers due to being a great teammate and leader in the Core.
Jan 6, 2023
Est Read Time: 3 min

A Pentester’s Guide to Prototype Pollution Attacks

Core Pentester Harsh Bothra guides us through prototype pollution attacks in his latest blog. This covers a security vulnerability that allows attackers to exploit JavaScript runtimes.
Jan 2, 2023
Est Read Time: 8 min

2022 Pentester Spotlight Recaps

With 2023 just around the corner, we wanted to reflect on our Pentester Spotlights from this year. Our Pentester Spotlight series is focused on highlighting the Cobalt Core Pentesters and putting a face to their work
Dec 30, 2022
Est Read Time: 3 min

Pentester Spotlight: Saad Nasir

Saad Nasir has been a member of the Cobalt Core for a little over six months. He has contributed to Cobalt's content pieces and was recently featured on the Hacker Corner podcast.
Dec 28, 2022
Est Read Time: 3 min

Cybersecurity Statistics for 2023

Every year in security we hear about more cyberattacks. With ransomware, zero-day exploits, data breaches, and such...
Dec 27, 2022
Est Read Time: 15 min

All you need to know about JWT Pt. 2

Did you read our introductory blog on JSON tokens in November? Now time for a deeper dive into JSON Web Tokens, aka JWT. Core Pentester Ninad Mathpati expands on all things JWT.
Dec 26, 2022
Est Read Time: 13 min

Steampipe: Monitor Your Cloud Resources

Are you working in the cloud? If so, you can use an open-source tool named Steampipe to monitor your cloud infrastructure using SQL. One of Cobalt's Core Pentesters walks us through how Steampipe works in our latest Pentester Guide.
Dec 21, 2022
Est Read Time: 8 min

Introduction to Command Injection Vulnerability

We've covered code injection attacks in recent blogs, but do you happen to know about command injection attacks? Core Pentester Harsh Bothra walks us through the differences and covers all you need to know to protect yourself against command injection attacks.
Dec 14, 2022
Est Read Time: 8 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.