WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Cobalt Pentest Case Study: OAuth Redirect to Account Takeover

Cobalt Core Penteser Edu Garcia recently used an interesting attack method while working on a Cobalt pentest. In this blog, he shares how he did it and provides a solution to the vulnerability.
Aug 31, 2022
Est Read Time: 3 min

How Low Severity Vulns Become Critical: PACMAN Attack Example

Your latest pentest report was just delivered and there are a dozen findings with severity scores ranging from...
Aug 30, 2022
Est Read Time: 3 min

Pentester Spotlight: Apoorva Jois; Do you want to build or break?

Do you want to build or break? That's the million-dollar question that got Core Pentester Apoorva Jois interested in hacking. She walked us through her journey as a Pentester on the younger side of the industry.
Aug 26, 2022
Est Read Time: 3 min

File Upload Vulnerabilities

This blog aims to demonstrate how applications can be compromised using simple file upload functionalities. Core Pentester Shubham Chaskar will show how to bypass common defense mechanisms and upload web shells.
Aug 24, 2022
Est Read Time: 9 min

What Is a Bot?

A bot, short for robot, is an autonomous program that performs automatic repetitive tasks or mimics the actions of a...
Aug 23, 2022
Est Read Time: 5 min

Then & Now: Nastor

Nicolas Astor, aka "Nastor," has been a part of Cobalt's Core since December 2020. We sat with him to talk about how he and Cobalt have changed over the year.
Aug 22, 2022
Est Read Time: 2 min

Inc. Magazine Reveals Annual List of America’s Fastest-Growing Private Companies—the Inc. 5000

We are excited to announce that this week, Inc. magazine revealed its annual list of America’s fastest growing private...
Aug 19, 2022
Est Read Time: 1 min

Graph Query Language Explained

Cobalt Core Pentester Harsh Bothra explains Graph Query Language and how attackers use it. Read his guide to learn how attackers think and take advantage.
Aug 18, 2022
Est Read Time: 9 min

17 Upcoming Cybersecurity Events 2022

Cybersecurity requires synergy across many different people, processes, and technology. To achieve a strong security...
Aug 15, 2022
Est Read Time: 7 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.