GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

What it means to be in the Cobalt Core

What does it mean to be in the Cobalt Core? I asked some of our Core Pentesters about their experiences in the Core and what has been most memorable for them.
Oct 18, 2022
Est Read Time: 4 min

Platform Deep Dive: New Risk Advisories Enrich Findings With CVE and NVD Data

Uncover the potential risks in your tech stack all in one platform and make an informed security plan.
Oct 17, 2022
Est Read Time: 2 min

G2 Ranks Cobalt #1 in Penetration Testing

It’s official: users love us! G2 named Cobalt the #1 leader for the fourth consecutive quarter in its Fall 2022 Grid®...
Oct 14, 2022
Est Read Time: 2 min

The Guide to Understanding Content Security Policy (CSP) and Bypass Exploits

This blog post aims to demonstrate what CSP is and why CSP is implemented. And how attackers can bypass CSP. In this article, I will include how you can bypass some directives to achieve XSS on the target application.
Oct 12, 2022
Est Read Time: 9 min

Pentester of the Quarter: Farid Luhar

The Cobalt Community team is excited to announce that our Q4 Pentester of the Quarter is Farid Luhar! Farid has been...
Oct 5, 2022
Est Read Time: 1 min

Pentester Spotlight: Nilesh Sapariya

Pentester Origin Story: How did you first get involved in pentesting? Back in time, when I was in 2nd year of...
Oct 3, 2022
Est Read Time: 7 min

Web Socket Vulnerabilites

WebSockets are an exciting technology that has been gaining traction in the industry. Many companies are using the technology, especially in their real-time services
Sep 27, 2022
Est Read Time: 9 min

Secure Software Best Practices: Protect Against Server-Side Request Forgery

See examples of Server-Side Request Forgery (SSRF) exploitation, and learn how to minimize your risks.
Sep 26, 2022
Est Read Time: 7 min

Secure Software Best Practices: Validate User Input

Protect your systems from bad user input. In this article, we share best practices to validate user input, securely.
Sep 23, 2022
Est Read Time: 6 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.