WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Hacking Solidity Smart Contracts

August 10, 2022
Est Read Time: 8 min
Today we will look at hacking smart contracts written using the Solidity programming language. We will fix an overflow/underflow vulnerability on PWNX Academy
Vulnerabilities

Why Scalable Security Teams Make SO MUCH SENSE for Startups

August 8, 2022
Est Read Time: 5 min
Cobalt partner Eden Data explores a new way startups can tackle security without braking the bank.
Cybersecurity Insights

Attacking Windows Applications Pt. 2

August 4, 2022
Est Read Time: 10 min
Welcome to the second part of the blog series "Attacking windows application." In this blog, we go more in-depth on attacking these applications and the tools used.
Cobalt Core Vulnerabilities

ESG Report: Cobalt Customers Fix Vulnerabilities 66% Faster for Half the Cost

August 3, 2022
Est Read Time: 3 min
Enterprise Strategy Group (ESG) put us to the test, analyzing Cobalt-provided material, public and industry knowledge of pentesting and security practices, and the results of customer interviews and subject-matter experts. 
Modernizing Pentesting

Platform Deep Dive: Co-branded Pentest Reports

July 29, 2022
Est Read Time: 2 min
As of July, partners can include their logo on pentest reports for our shared customers.
Product Updates

Meet Judy: The Security AI Watching Out for Small and Midsize Businesses

July 29, 2022
Est Read Time: 4 min
Compliance mapping, ongoing security training, endpoint detection and response, password management, and 24/7 monitoring — if you pictured a whole team of security consultants while reading this, you’ve clearly not met Judy.
Cybersecurity Insights

Pentester Spotlight: Ninad Mathpati

July 27, 2022
Est Read Time: 4 min
Ninad Mathpati is a Cybersecurity Enthusiast and Hacker with an ethical mindset. He has been working as an Application Security Engineer for 5+ years
Cobalt Core

What is Threat Modeling?

July 22, 2022
Est Read Time: 3 min
Senior Security Consultant Gisela Hinojosa walks us through the STRIDE framework and her threat modeling process.
Cybersecurity Insights Cybersecurity Services

AppSec vs. DevSecOps

July 20, 2022
Est Read Time: 3 min
AppSec and DevSecOps offer similar but different approaches to cybersecurity. By understanding the differences,...
DevSecOps

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.