WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Platform Deep Dive: New Risk Advisories Enrich Findings With CVE and NVD Data

Uncover the potential risks in your tech stack all in one platform and make an informed security plan.
Oct 17, 2022
Est Read Time: 2 min

G2 Ranks Cobalt #1 in Penetration Testing

It’s official: users love us! G2 named Cobalt the #1 leader for the fourth consecutive quarter in its Fall 2022 Grid®...
Oct 14, 2022
Est Read Time: 2 min

The Guide to Understanding Content Security Policy (CSP) and Bypass Exploits

This blog post aims to demonstrate what CSP is and why CSP is implemented. And how attackers can bypass CSP. In this article, I will include how you can bypass some directives to achieve XSS on the target application.
Oct 12, 2022
Est Read Time: 9 min

Pentester of the Quarter: Farid Luhar

The Cobalt Community team is excited to announce that our Q4 Pentester of the Quarter is Farid Luhar! Farid has been...
Oct 5, 2022
Est Read Time: 1 min

Pentester Spotlight: Nilesh Sapariya

Pentester Origin Story: How did you first get involved in pentesting? Back in time, when I was in 2nd year of...
Oct 3, 2022
Est Read Time: 7 min

Web Socket Vulnerabilites

WebSockets are an exciting technology that has been gaining traction in the industry. Many companies are using the technology, especially in their real-time services
Sep 27, 2022
Est Read Time: 9 min

Secure Software Best Practices: Protect Against Server-Side Request Forgery

See examples of Server-Side Request Forgery (SSRF) exploitation, and learn how to minimize your risks.
Sep 26, 2022
Est Read Time: 7 min

Secure Software Best Practices: Validate User Input

Protect your systems from bad user input. In this article, we share best practices to validate user input, securely.
Sep 23, 2022
Est Read Time: 6 min

7 Benefits of Continuous Pentesting

Companies regularly pentest to adhere to compliance requirements but is this enough to actually stay secure? Table of...
Sep 22, 2022
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.