• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From bishopfox.com

Broken Hill: A Productionized Greedy Coordinate Gradient Attack Tool…

0 1

Walkthrough the GCG attack at a high level and be introduced to Broken Hill – Bishop Fox’s newly-released tool that can perform the GCG attack against a…

on Sep 24

From bishopfox.com

Job Listing

0 0

Current job listings at Bishop Fox, the leading cyber security company. Come work with us!

on Sep 20

From bishopfox.com

An Exploration & Remediation of JSON Interoperability Vulnerabilities

0 2

Learn more about how the same JSON document can be parsed with different values across microservices, leading to a variety of potential security risks.

on Sep 4

From bishopfox.com

Livestream from DEFCON 32 - 2024

0 0

Join our 3rd Annual Bishop Fox Livestream, happening during DEF CON 32 - a convergence where innovation meets expertise in the realm of cybersecurity.

on Aug 9

From bishopfox.com

Traeger Grill D2 Wi-Fi Controller, Version 2.02.04 Advisory

0 0

Discover critical vulnerabilities in the Traeger Grill D2 Wi-Fi Controller that could impact your grill's security. Read our advisory.

on Jul 3

From bishopfox.com

Never Use Text Pixelation To Redact Sensitive Information

0 0

See why you should never use pixelation for redacting text and why it is a surefire way to get your data leaked. Learn from security researcher Dan Petro.

on May 20

From bishopfox.com

Netscaler ADC and Gateway, Version 13.1-50.23

0 0

The affected Citrix NetScaler components are used for Authentication, Authorization, and Auditing (AAA), and remote access. The latest version of…

on May 7

From bishopfox.com

Poisoned Pipeline Execution Attacks: A Look at CI-CD Environments

0 0

Bishop Fox examines types of poisoned pipeline execution (PPE) attacks, methods to exploit these vulnerabilities, and recommended preventive measures.

on Mar 26

From bishopfox.com

The iSOON Disclosure: Exploring the Integrated Operations Platform

0 0

Bishop Fox examines the iSoon data disclosure from an offensive security perspective and an analysis of the platform's capabilities, design, features.

on Mar 21

From bishopfox.com

Further Adventures in Fortinet Decryption

0 0

In this blog, we examine how the new Fortinet encryption scheme works and provide a tool to decrypt the root filesystem for x86-based FortiOS images.

on Mar 14

From bishopfox.com

Breaking Fortinet Firmware Encryption

0 0

Review our latest Fortinet analysis that breaks encryption on firmware images, leading to improved detection, fingerprinting, and exploit development.

on Mar 5

From bishopfox.com

News Insights: Does X Mark a Target? with Trevin Edgeworth, Director…

0 0

Regarding Bitcoin and SEC’s X account, Red Team Practice Director Trevin Edgeworth analyzes the role of fluctuating security programs in these incidents.

on Jan 25

From bishopfox.com

Adopting Proactive Social Engineering and Network Testing Strategies

0 0

Get insights from Bishop Fox experts on social engineering tactics, implementing technical controls, and the importance of internal network testing.

on Jan 23

From bishopfox.com

It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly…

0 0

Learn about SonicWall NGFW series 6 and 7 impacted by unauthenticated denial-of-service vulnerabilities with the potential for remote code execution.

on Jan 22

From bishopfox.com

Pwning the Domain with Sliver Framework

0 0

Senior security expert Jon Guild demonstrates how to use the Sliver C2 framework to develop advanced offensive security skills from first-hand experience.

on Jan 21

From bishopfox.com

News Insights: Patch Procrastination with Trevin Edgeworth, Director…

0 0

Bishop Fox's Trevin Edgeworth, spotlights notable vulnerabilities - left unpatched for years and discusses how unpatched vulnerabilities can wreak havoc.

on Jan 21

From bishopfox.com

Swagger Jacker

0 1

Swagger Jacker is an audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files. Learn more here!

on Jan 6

From bishopfox.com

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

0 1

Join Bishop Fox for a demo of Swagger Jacker, an open-source audit tool to improve inspection of unintentionally exposed OpenAPI definition files.

on Jan 5

From bishopfox.com

Validating Incident Response Plans with Red Team Tabletop Exercises

0 0

Learn how Red Team tabletop exercises help organizations test Incident Response plans against tactics, techniques, and procedures used by attackers.

on Jan 4

From bishopfox.com

The "New CISO" Special: Organizing the Chaos

0 0

Bishop Fox, Senior Solutions Architect Matt Twells, offers a comprehensive guide to ease into your role confidently, providing a strategic framework.

on Jan 3

From bishopfox.com

GWT: Unpatched, Unauthenticated Java Deserialization

0 0

In this blog, Bishop Fox's Ben Lincoln talks about an eight year old unpatched and unauthenticated Java deserialization vulnerability in GWT. Learn more!

on Dec 18

From bishopfox.com

Healthcare: 2023 Insights from the Ponemon Institute

0 0

Get insights into offensive security trends in the healthcare sector with data from the Ponemon Institute’s 2023 State of Offensive Security Report.

on Dec 14

From bishopfox.com

Introducing Swagger Jacker: Auditing OpenAPI Definition Files

0 0

Download Swagger Jacker, an open-source tool made for penetration testers that enables better auditing of OpenAPI definition files. Learn more here!

on Dec 12

From bishopfox.com

Impact of FDA's HR.2617 Legislation on Medical Device Cybersecurity

0 0

Join Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity and how to address vulnerabilities and risks.

on Dec 8

From bishopfox.com

Purple Teaming: Validating Cybersecurity Investments and Enhancing…

0 0

Learn how Purple Teaming brings together offensive and defensive strategies for a more comprehensive and impactful cybersecurity approach.

on Dec 7

From bishopfox.com

Ray, Versions 2.6.3, 2.8.0

0 0

This Bishop Fox advisory highlights three critical severity vulnerabilities in the RAY application versions 2.6.3 and 2.8.0.

on Nov 28

From bishopfox.com

Bishop Fox Holiday Gift Guide for Hackers

0 0

Use the Bishop Fox Hacker Holiday Gift Guide to find the perfect gifts for all of the hackers in your life.

on Nov 22

From bishopfox.com

The Offensive Security Blueprint for Healthcare

0 0

Bishop Fox's Healthcare industry guide provides an analysis of offensive security trends within healthcare. Download the guide now!

on Nov 15

From bishopfox.com

Cloud Security Podcast Featuring Seth Art: Cloud Pentest of AWS

0 0

Hear insights from Seth Art on how AWS cloud penetration testing improves cloud security and why cloud configuration reviews are not always enough.

on Nov 13

From bishopfox.com

Blog: How to Go from Active Duty to Civilian Cybersecurity

0 0

Learn how Bishop Fox veterans have used the Department of Defense Skillbridge program to transition from military service to civilian cybersecurity.

on Nov 11

From bishopfox.com

XMPP service is an underappreciated attack surface for pen testers

0 0

Misconfigured XMPP (aka Jabber) servers may not be the most common service you encounter during pen tests, but they can prove very valuable. Read more.

on Nov 11

From bishopfox.com

Cloud Security Podcast Featuring Seth Art: Network Pentest 2.0

0 0

Learn about cloud security and cloud penetration testing in Seth Art's, principal security consultant at Bishop Fox, interview with Cloud Security Podcast.

on Nov 9

From bishopfox.com

Pentest Tools Podcast: We Think We Know How to Explain the Value of a…

0 2

Hear from Bishop Fox's Alethe Denis in the first episode of Pentest Tool's 'We Think We Know' podcast to unravel the intricacies of security testing.

on Nov 8

From bishopfox.com

Bridging the Gap: Integrating Tabletop Exercises and Red Teaming for…

0 0

Join Shanni Prutchi, to learn about enhancing your organization's incident response capabilities through combined red teaming and tabletop exercises.

on Nov 6

From bishopfox.com

Bishop Fox Interview with John Hammond - DEF CON 31

0 0

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

on Nov 4

From bishopfox.com

Celebrating One Year of CloudFox

0 0

Celebrate CloudFox's one-year anniversary as we reflect on the updates and growth that have occurred over the year including the creation of CloudFoxable.

on Nov 3

From bishopfox.com

Meet Bishop Fox at Health-ISAC Fall Summit 2023

0 0

Bishop Fox will participate at the annual 2023 H-ISAC Fall Americas Summit in San Antonio, Texas.

on Nov 2

From bishopfox.com

OWASP ASVS: Unlocking Stronger Application Security

0 0

Join Shanni Prutchi as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard.

on Oct 31

From bishopfox.com

Building an Exploit for FortiGate Vulnerability CVE-2023-27997

0 0

Learn how Bishop Fox built a POC exploit for the pre-authentication remote code injection vulnerability in the Fortinet SSL VPN published by Lexfo.

on Oct 27

From bishopfox.com

Bishop Fox will be at API's Oil & Natural Gas Cybersecurity Conference

0 0

Bishop Fox is a proud sponsor of the 18th Annual API Conference. Stop by the Bishop Fox table to meet our team.

on Oct 26

From bishopfox.com

Pragmatic AI, ML, & LLM Security Mitigations for Production

0 0

Immerse yourself in AI, ML, and LLMs during our webcast presented in collaboration with industry leaders, Moveworks and Shostack + Associates. Register now!

on Oct 26

From bishopfox.com

Cosmos: Unleashing the Power of Perimeter Protection

0 0

Get a preview of the Cosmos: Protecting the Perimeter report and learn how continuous attack surface management protects digital perimeters.

on Oct 24

From bishopfox.com

Guide to Do-It-Yourself Network Segmentation

0 0

Bishop Fox's updated guide to do-it-yourself network segmentation shows how to practically and inexpensively ensure network security for home or business .

on Oct 17

From bishopfox.com

The Offensive Security Blueprint for Financial Services

0 0

Bishop Fox's Financial Services industry guide provides an analysis of offensive security trends within financial services. Download the guide now!

on Oct 16

From bishopfox.com

Bishop Fox Guide: Penetration Testing Resources

0 0

Looking to break into pen testing? There’s a lot you can do on your own and this guide will help you get started!

on Oct 11

From bishopfox.com

Red Teaming: The Essential Tool for Security Leaders

0 1

Join Trevin Edgeworth, Red Team Practice Director, as he sheds light on why Red Teaming is the ultimate "sanity check" for security leaders. Register Now!

on Oct 6

From bishopfox.com

Red Teaming: 2023 Insights from the Ponemon Institute

0 0

Learn how Red Teaming improves preparedness for organizations with advanced cybersecurity programs with research findings from the Ponemon Institute.

on Oct 4, 2023

From bishopfox.com

Ace the OSEP Exam with Sliver Framework

0 1

Unlock the secrets of passing the OSEP exam with our cybersecurity expert, Jon Guild. Jon will share tips and tricks for conquering this benchmark exam.

on Oct 2, 2023