GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Apr 9, 2019
Est Read Time: 2 min

From SSRF to Port Scanner

How to convert a SSRF vulnerability into a Port Scanner
Mar 18, 2019
Est Read Time: 4 min

A Manager’s Guide to Selecting the Best Testing Approach for Your Application Security Needs

Security testing has emerged as a common best practice among application security programs of all types and sizes. The...
Mar 14, 2019
Est Read Time: 9 min

3 things you should be doing when you pentest an Android application

To perform a pentest on an android application there are three important things that should be done by the pentester.
Jan 18, 2019
Est Read Time: 2 min

Humans of InfoSec: A New Security Podcast

https://soundcloud.com/humans-of-infosec
Apr 5, 2018
Est Read Time: 2 min

How to Choose a Pentest Service

Penetration testing or pentesting for short is a simulation of an attack on your company’s IT infrastructure or...
Mar 14, 2018
Est Read Time: 3 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.