WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentester of the Quarter: Shubham Chaskar

April 10, 2023
Est Read Time: 1 min
Cobalt is excited to announce that Shubham Chaskar is the Q2 Pentester of the Quarter!
Cobalt Core

Meet Lisa Matherly Cobalt's New Chief Marketing Officer

April 5, 2023
Est Read Time: 4 min
This week Cobalt welcomed Lisa Matherly, as Chief Marketing Officer. With over two decades of experience in B2B...
NEWS Life at Cobalt

Dynamic Duo: Dhiraj Mishra & Zubin Devnani

April 5, 2023
Est Read Time: 2 min
Dhiraj Mishra and Zubin Devnani, two Core Pentesters, have led ten successful fuzzing workshops together and have plans to continue. Read about how they got started in our blog about the Dynamic Duo in the Core.
Cobalt Core

The Fifth Edition State of Pentesting Report: Preview

April 4, 2023
Est Read Time: 2 min
The State of Pentesting 2023 drops on April 12th — get a taste of the report with this sneak peek, and sign up to receive it in your inbox on launch day.
Modernizing Pentesting

Overflow Vulnerabilities

April 3, 2023
Est Read Time: 14 min
Overflow vulnerabilities occur when a program or system accepts more data than it can handle, leading to memory corruption and potentially allowing attackers to execute malicious code. Core Pentester Ninad Mathpati writes about these types of vulnerabilities and how to prevent them.
Vulnerabilities

A Penetration Tester's Guide To Web Applications

March 29, 2023
Est Read Time: 5 min
Cybersecurity teams constantly need to adapt and protect networks against new vulnerabilities and maintain their...
Web Application Pentesting Vulnerabilities

10 Steps to Secure Your Azure Cloud Environment

March 29, 2023
Est Read Time: 11 min
The blog discusses ten essential steps to secure your Azure cloud environment, ranging from access management to network security. It emphasizes the use of Azure CLI to implement these best practices and safeguard against potential security threats. The steps include multifactor authentication, compliance standards, encryption, backups, and disaster recovery plans, among others.
Cloud Security Vulnerabilities

Pentester Spotlight: Herane Malhotra

March 26, 2023
Est Read Time: 2 min
This month's Pentester Spotlight features Herane Malhotra, a Core Pentester since 2021 and Lead.
Cobalt Core

OAuth Vulnerabilites Pt. 2

March 20, 2023
Est Read Time: 10 min
OAuth is a widely-used protocol that enables users to authorize third-party applications to access their data from other services, such as social media or cloud storage. However, like any technology, OAuth is not immune to vulnerabilities. This is Pt. 2 of a two-part series by Core Pentester Shubham Chaskar.
Cobalt Core Vulnerabilities

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.