WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Back to Basics: How to Build Resilient Blue Teams

February 24, 2023
Est Read Time: 11 min
A comprehensive guide on how security teams can keep up with organizational change.
Cybersecurity Insights

Pentester Spotlight: Goonjeta Malhotra

February 23, 2023
Est Read Time: 2 min
“Pentesting allowed me to challenge my skills and knowledge, to think of creative ways to exploit and identify vulnerabilities, and always to find ways to improve security posture." That's what Core Pentester Goonjeta Malhotra said about her journey into pentesting. Learn more about Goonjeta in here Pentester Spotlight.
Cobalt Core

Introduction to Chrome Browser Extension Security Testing

February 20, 2023
Est Read Time: 13 min
Browser extensions are software components that enhance the functionality of existing programs, specifically web browsers by modifying the user interface and interaction with websites, allowing users to customize their browsing experience. However, they also pose a security risk as they interact directly with untrusted web content and have vulnerabilities that malicious website operators and network attackers can exploit. This blog highlights the importance of Chrome browser extension security, permissions, testing for vulnerabilities, real-time attack scenarios, and mitigation methods.
Cobalt Core Vulnerabilities

Getting Started in Pentesting

February 16, 2023
Est Read Time: 4 min
Interested in pentesting but don't know where to start? Our Core Pentesters have you covered. Read to hear their tips and advice on how to get started.
Cobalt Core

Why is Cybersecurity Important in the Fintech Industry?

February 14, 2023
Est Read Time: 7 min
Learn about the importance of cybersecurity for fintech companies with insights from the cybersecurity experts at Cobalt.
Modernizing Pentesting

Pentests in Risk Assessments: When, Why, How

February 14, 2023
Est Read Time: 3 min
Find your vulnerabilities, determine the risk, and outline remediation — pentests can do all of this in support of your risk assessments.
Cybersecurity Insights

Introduction to LDAP Injection Attack

February 13, 2023
Est Read Time: 7 min
LDAP (Lightweight Directory Access Protocol) is a protocol for accessing and managing directory services over a network. LDAP injection is a type of attack that targets vulnerabilities in implementations of the LDAP. Core Pentester Harsh Bothra shows us how an attacker does this injection and how to protect against it.
Cobalt Core Vulnerabilities

Risks of Open-Source Software

February 8, 2023
Est Read Time: 8 min
This article provides an overview of what open-source software is and its history. Core Pentester Ninad Mathpati explains that open-source software is any program whose source code is made available for use or modification and is developed as a public, open collaboration.
Vulnerabilities

API Security Best Practices

February 3, 2023
Est Read Time: 4 min
As the devices providing Internet access increase daily, the traditional Monolith architecture has been replaced by the Microservice architecture due to the advantages such as scalability, faster deployment, ease of management, and many more. Core Pentester Orhan Yildirim shares his best practices for API Security.
API Pentesting Vulnerabilities

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.