GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Inc. Magazine Reveals Annual List of America’s Fastest-Growing Private Companies—the Inc. 5000

We are excited to announce that this week, Inc. magazine revealed its annual list of America’s fastest growing private...
Aug 19, 2022
Est Read Time: 1 min

Graph Query Language Explained

Cobalt Core Pentester Harsh Bothra explains Graph Query Language and how attackers use it. Read his guide to learn how attackers think and take advantage.
Aug 18, 2022
Est Read Time: 8 min

17 Upcoming Cybersecurity Events 2022

Cybersecurity requires synergy across many different people, processes, and technology. To achieve a strong security...
Aug 15, 2022
Est Read Time: 7 min

Hacking Solidity Smart Contracts

Today we will look at hacking smart contracts written using the Solidity programming language. We will fix an overflow/underflow vulnerability on PWNX Academy
Aug 10, 2022
Est Read Time: 7 min

Why Scalable Security Teams Make SO MUCH SENSE for Startups

Cobalt partner Eden Data explores a new way startups can tackle security without braking the bank.
Aug 8, 2022
Est Read Time: 5 min

Attacking Windows Applications Pt. 2

Welcome to the second part of the blog series "Attacking windows application." In this blog, we go more in-depth on attacking these applications and the tools used.
Aug 4, 2022
Est Read Time: 10 min

ESG Report: Cobalt Customers Fix Vulnerabilities 66% Faster for Half the Cost

Enterprise Strategy Group (ESG) put us to the test, analyzing Cobalt-provided material, public and industry knowledge of pentesting and security practices, and the results of customer interviews and subject-matter experts. 
Aug 3, 2022
Est Read Time: 3 min

Platform Deep Dive: Co-branded Pentest Reports

As of July, partners can include their logo on pentest reports for our shared customers.
Jul 29, 2022
Est Read Time: 2 min

Meet Judy: The Security AI Watching Out for Small and Midsize Businesses

Compliance mapping, ongoing security training, endpoint detection and response, password management, and 24/7 monitoring — if you pictured a whole team of security consultants while reading this, you’ve clearly not met Judy.
Jul 29, 2022
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.