WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Hacking Solidity Smart Contracts

Today we will look at hacking smart contracts written using the Solidity programming language. We will fix an overflow/underflow vulnerability on PWNX Academy
Aug 10, 2022
Est Read Time: 7 min

Why Scalable Security Teams Make SO MUCH SENSE for Startups

Cobalt partner Eden Data explores a new way startups can tackle security without braking the bank.
Aug 8, 2022
Est Read Time: 5 min

Attacking Windows Applications Pt. 2

Welcome to the second part of the blog series "Attacking windows application." In this blog, we go more in-depth on attacking these applications and the tools used.
Aug 4, 2022
Est Read Time: 10 min

ESG Report: Cobalt Customers Fix Vulnerabilities 66% Faster for Half the Cost

Enterprise Strategy Group (ESG) put us to the test, analyzing Cobalt-provided material, public and industry knowledge of pentesting and security practices, and the results of customer interviews and subject-matter experts. 
Aug 3, 2022
Est Read Time: 3 min

Platform Deep Dive: Co-branded Pentest Reports

As of July, partners can include their logo on pentest reports for our shared customers.
Jul 29, 2022
Est Read Time: 2 min

Meet Judy: The Security AI Watching Out for Small and Midsize Businesses

Compliance mapping, ongoing security training, endpoint detection and response, password management, and 24/7 monitoring — if you pictured a whole team of security consultants while reading this, you’ve clearly not met Judy.
Jul 29, 2022
Est Read Time: 4 min

Pentester Spotlight: Ninad Mathpati

Ninad Mathpati is a Cybersecurity Enthusiast and Hacker with an ethical mindset. He has been working as an Application Security Engineer for 5+ years
Jul 27, 2022
Est Read Time: 4 min

What is Threat Modeling?

Senior Security Consultant Gisela Hinojosa walks us through the STRIDE framework and her threat modeling process.
Jul 22, 2022
Est Read Time: 4 min

AppSec vs. DevSecOps

AppSec and DevSecOps offer similar but different approaches to cybersecurity. By understanding the differences,...
Jul 20, 2022
Est Read Time: 3 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.