AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Meet the Author

Bishop Fox Researchers Security Researchers

Due to the nature in which Bishop Fox security experts conduct research and penetration tests, some prefer to remain anonymous. Their work is published under the Bishop Fox name.

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We’ve worked with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies to improve their security. Our Cosmos platform, service innovation, and culture of excellence continue to gather accolades from industry award programs including Fast Company, Inc., SC Media, and others, and our offerings are consistently ranked as “world class” in customer experience surveys. We’ve been actively contributing to and supporting the security community for almost two decades and have published more than 16 open-source tools and 50 security advisories in the last five years. Learn more at bishopfox.com or follow us on Twitter.

Bishop Fox Researchers

Posts from Bishop Fox Researchers

Feb 04, 2026

Get the Most from Testing Your Applications

Dec 04, 2025

Arista NextGen Firewall XSS to RCE Chain

Aug 11, 2025

Building Security at Scale: The AppExchange Story

Jul 17, 2025

Fox Den Pull List: Our Favorite Comics

Jun 26, 2025

Sitecore Experience Platform Vulnerabilities: Critical Update Needed for Versions 10.1 to 10.3

Dec 13, 2024

Current State of SonicWall Exposure: Firmware Decryption Unlocks New Insights

Dec 12, 2024

Our Favorite Pen Testing Tools: 2024 Edition

Dec 02, 2024

Sonicwall Firmware Deep Dive - SWI Firmware Decryption

Nov 01, 2024

A Brief Look at FortiJump (FortiManager CVE-2024-47575)

Oct 15, 2024

Off the Fox Den Bookshelf: Security and Tech Books We Love

Sep 17, 2024

Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing

Aug 01, 2024

Adversarial Controls Testing: A Step to Cybersecurity Resilience

Jul 17, 2024

Leveraging Offensive Security for Effective Post-Attack Recovery

Jun 14, 2024

How Does Social Engineering Work? From Planning to Execution

May 06, 2024

OOB Memory Read: Netscaler ADC and Gateway

Apr 19, 2024

PAN-OS CVE-2024-3400: Patch Your Palo Alto Firewalls

Apr 01, 2024

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Mar 21, 2024

The iSOON Disclosure: Exploring the Integrated Operations Platform

Mar 08, 2024

Further Adventures in Fortinet Decryption

Mar 01, 2024

CVE-2024-21762 Vulnerability Scanner for FortiGate Firewalls

Oct 27, 2023

Building an Exploit for FortiGate Vulnerability CVE-2023-27997

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.