ImageTragick
One of the most interesting vulnerabilities that could potentially allow Remote Code Execution (RCE). Check out this article from our researcher Miguel Regala on Cobalt Blog.
Our experienced professionals have helped organizations to secure their assets, improving trustworthy
We are specialists in Web Applications security testing (e.g. websites, portals, applications, etc.) but with a well-established and solid partners network we can easily cover any scope. We aim to protect our clients assets, mitigating the impact of compromised systems and information leaking. We partner with our clients, sharing the responsibility to protect their assets.
Independent security auditing is the best way to identify weaknesses. We offer penetration testing services (one-time-only or persistent) with required support to mitigate any security risks.
Every organisation needs a strong information security posture. We provide the necessary tools and services in establishing a channel to reduce the risk of data losses.
The human factor is still considered to be the primary risk in security. Our trainings empower organizations with the best information to defend itself against ever-evolving threats.
Banking, insurance, credit card companies, credit unions, savings, investment companies, brokerage firms, etc.
Biotechnology companies, pharmaceutical companies, clinics, hospitals, healthcare products manufacturers/sellers, etc.
Hardware, software, data centers, platforms, infrastructure, systems integrator, etc.
Social Media, video games, publishing, telecom equipment, telecom services, wireless communication, etc.
One of the most interesting vulnerabilities that could potentially allow Remote Code Execution (RCE). Check out this article from our researcher Miguel Regala on Cobalt Blog.