PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

How to Communicate the Business Impact of Vulnerabilities

February 8, 2021
Est Read Time: 3 min
You’ve discovered a new vulnerability in your infrastructure. If you’re lucky, it’s something you can handle without...
Cybersecurity Insights

A Pentester’s Guide to WebSocket Pentesting

February 5, 2021
Est Read Time: 4 min
What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Pentester Guides Web Application Pentesting

Prevent Whaling Phishing Attacks with Cybersecurity Awareness

January 29, 2021
Est Read Time: 5 min
Although whale phishing isn’t anything new and existed since the early 90s, the FBI reports an increase in cyberattacks...
Cybersecurity Insights Cybersecurity Services

Bypassing the Protections — MFA Bypass Techniques for the Win

January 27, 2021
Est Read Time: 6 min
Multi-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added...
Pentester Guides

A Pentester’s Guide to Code Injection

January 8, 2021
Est Read Time: 3 min
Learn about code injection vulnerabilities with the Pentester’s Guide to Code Injection.
Cobalt Core Pentester Guides

Top Ten Famous Hackers

January 5, 2021
Est Read Time: 10 min
*This article was refreshed in January 2023. The top hackers in the world come from different backgrounds and...
Cybersecurity Insights

Exploring Valuable Pentester Traits: Top Cobalt Core Pentesters of 2020

December 30, 2020
Est Read Time: 3 min
Each year we survey the Cobalt Core, our pentester community, to hear who they enjoyed working with the most. We like...
Cobalt Core

A Pentester's Guide to Server Side Template Injection (SSTI)

December 24, 2020
Est Read Time: 3 min
Server-side template injection is a vulnerability where the attacker injects malicious input into a template to execute commands on the server-side.
Cobalt Core Pentester Guides

Ask a Hacker: How Close is Cyberpunk 2077 to Reality?

December 21, 2020
Est Read Time: 7 min
The long-awaited Cyberpunk 2077 arrived last week, and well, it hasn’t met expectations. To put it simply, the Internet...
Cybersecurity Insights

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.