GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Bypassing CSRF tokens with Python’s CGIHTTPServer to exploit SQL injections

There are ways to configure Burp using macros to bypass CSRF tokens on HTML forms, so we can use Burp Active Scans,...
Oct 11, 2017
Est Read Time: 4 min

How to Survive a Vendor Security Questionnaire

Tips on vendor assessments from experts in the industry
Aug 14, 2017
Est Read Time: 7 min

New Alternatives to Bug Bounty Programs

Before you can choose the right approach to test your application security, you first need to understand your options —...
Aug 2, 2017
Est Read Time: 4 min

UX-Friendly Enumeration Protection in Ruby on Rails

How to avoid revealing the existence of records to attackers in web applications, while keeping a good user experience...
May 23, 2017
Est Read Time: 4 min

Penetration Testing for SaaS Companies

SaaS companies have fundamentally transformed the enterprise software model and at this point it seems there is no...
May 8, 2017
Est Read Time: 3 min

Start at Zero with the OWASP Top 10

Engineering is an exercise in working within constraints. Appsec increases those constraints, forcing developers to...
Apr 24, 2017
Est Read Time: 3 min

Introducing In-App Pentest Reports

My name is Kevin Bourne and I recently joined Cobalt as their new Customer Success Manager. My primary responsibility...
Mar 28, 2017
Est Read Time: 1 min

Crowdsourced Penetration Testing and PCI DSS Compliance

Various regulatory requirements that are lurking across different industries — involving different aspects of...
Mar 20, 2017
Est Read Time: 5 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.