GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentester Diaries Ep.9: Talking Certifications with Heath Adams

Pentest Diaries Ep.9: Talking Certifications with Heath Adams Welcome and happy Cybersecurity Awareness Month!
Oct 8, 2021
Est Read Time: 5 min

How Does Penetration Testing Differ from a Vulnerability Assessment?

This article was refreshed in January 2023.
Oct 7, 2021
Est Read Time: 4 min

Phishing Awareness Testing Services

Successful phishing campaigns are one of the most common causes of a cyber breach. In fact, over 80% of reported...
Oct 4, 2021
Est Read Time: 3 min

PtaaS and Bug Bounty: Which to Choose for Security Testing

Fixing vulnerabilities is an important part of reducing an application’s overall risk to remain well-protected over...
Sep 30, 2021
Est Read Time: 4 min

Strengthen Your Security Posture with Cobalt’s Cybersecurity Services

At Cobalt, we keep our customers’ security top of mind. That’s why we are delighted to announce the launch of our...
Sep 22, 2021
Est Read Time: 1 min

How to Achieve SOC 2 Type 2 Compliance

Back in May 2020, Cobalt achieved their SOC 2, Type 1 compliance and is excited to say it is now SOC 2 Type 2 compliant...
Sep 19, 2021
Est Read Time: 2 min

Pentest Diaries Ep.8: Android Pentesting

Pentest Diaries Ep.8: Android Pentesting Highlights In this edition of Pentest Diaries, we had the opportunity to sit...
Sep 17, 2021
Est Read Time: 6 min

From CSRF and File Upload to RCE - JAVA

I have come across many interesting vulnerabilities throughout my offensive security career. In this post, I would like...
Sep 16, 2021
Est Read Time: 6 min

Terraform, The Less-Common Commands And Options

This post was originally published on cloudlad.io
Sep 14, 2021
Est Read Time: 5 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.