WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.
WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentester Spotlight: Herane Malhotra

This month's Pentester Spotlight features Herane Malhotra, a Core Pentester since 2021 and Lead.
Mar 26, 2023
Est Read Time: 2 min

OAuth Vulnerabilites Pt. 2

OAuth is a widely-used protocol that enables users to authorize third-party applications to access their data from other services, such as social media or cloud storage. However, like any technology, OAuth is not immune to vulnerabilities. This is Pt. 2 of a two-part series by Core Pentester Shubham Chaskar.
Mar 20, 2023
Est Read Time: 10 min

AI May Not Steal Your Job, But It Could Eliminate It With A Devastating Cyberattack

Artificial Intelligence and Machine Learning have been used in a variety of cybersecurity tools - but let’s talk about the flip side of that coin. How could AI be used to attack, rather than defend?
Mar 17, 2023
Est Read Time: 3 min

Effective Penetration Testing Frameworks and Methodologies

Penetration testing is vital to identify potential security vulnerabilities on a network before cybercriminals find and...
Mar 16, 2023
Est Read Time: 5 min

Gartner Names Cobalt in Report on DevSecOps Tools for Secure Software Delivery

Gartner's recent report “How to Select DevSecOps Tools for Secure Software Delivery” gives a birds-eye view of the technology landscape, emphasizing the benefits to integrating developer-friendly tools into DevOps pipelines. In a section of the report titled “Preproduction and Release Phases” Gartner name-drops Cobalt as a representative penetration testing vendor.
Mar 15, 2023
Est Read Time: 2 min

Active Directory Series: Active Directory Fundamentals

Active Directory is a Microsoft service that provides centralized management of user accounts, devices, and access to resources in a networked environment. It allows IT professionals to create and manage users, groups, computers, and other resources on a network, and control access to those resources based on policies and permissions.
Mar 13, 2023
Est Read Time: 12 min

Cobalt Release Blog: February 2023

Read about the improvements we launched to our PtaaS Platform last month: new integrations, asset vulnerability updates, and more.
Mar 10, 2023
Est Read Time: 1 min

The Life of a Bug

With this post I'll present a way to better understand bugs, from their origin until their death. I’ll do this by introducing the idea of a security bug pipeline and Fix-to-Fix framework.
Mar 3, 2023
Est Read Time: 5 min

Decoding the Differences: Black, Gray, and White-Box Pentests

Different types of pentesting methods have designated colors with the key differences.
Mar 1, 2023
Est Read Time: 5 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.