WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Cobalt Core (6)

Red Teaming vs. Pentesting

Core Pentester Saad Nasir writes about what the difference between red teaming and pentesting is based on his own experiences. Saad is a Pentester in Cobalt's Core and on the Red Team at SolarWinds.
Nov 21, 2022
Est Read Time: 2 min

Common Vulnerabilities in NodeJS Applications

Node.js is an open-source and cross-platform JavaScript runtime environment. Today we are going to look at 3 different vulnerabilities by analyzing the source code of an application and how you can detect and exploit them. 
Nov 18, 2022
Est Read Time: 7 min

Source Code Review

Are you checking your new products for vulnerabilities in all capacities? Ninad Mathpati shares what you need to be doing during your Source Code Review and what attackers look for.
Nov 9, 2022
Est Read Time: 11 min

Pentesting Made Simple, an Italian Hacking Community

Core Pentester Reando Veshi has started his own hacking community in Italy: Pentesting Made Simple.
Nov 3, 2022
Est Read Time: 2 min

Pentester Feedback to Product Updates

Cobalt Core Pentesters can provide Cobalt's Product Team with direct feedback that is often translated into the platform. Director of Product, Mark Hamill, walks us through what that process looks like.
Nov 2, 2022
Est Read Time: 3 min

Pentester Spotlight: Alexis Fernández, Retired Developer takes on Pentesting

Alexis Fernandez has been a member of the Cobalt Core for a little over a year now. He started in security as a Web Developer before switching to ethical hacking.
Oct 26, 2022
Est Read Time: 3 min

What it means to be in the Cobalt Core

What does it mean to be in the Cobalt Core? I asked some of our Core Pentesters about their experiences in the Core and what has been most memorable for them.
Oct 18, 2022
Est Read Time: 4 min

The Guide to Understanding Content Security Policy (CSP) and Bypass Exploits

This blog post aims to demonstrate what CSP is and why CSP is implemented. And how attackers can bypass CSP. In this article, I will include how you can bypass some directives to achieve XSS on the target application.
Oct 12, 2022
Est Read Time: 9 min

Pentester of the Quarter: Farid Luhar

The Cobalt Community team is excited to announce that our Q4 Pentester of the Quarter is Farid Luhar! Farid has been...
Oct 5, 2022
Est Read Time: 1 min
    4 5 6 7 8