Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.
SonicWall-CVE-2024-53704: Exploit Details
Mar 21, 2025
By Jon Williams
Tomcat CVE-2025-24813: What You Need to Know
Mar 18, 2025
By Jon Williams
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware
Feb 24, 2025
By Jon Williams
SonicWall CVE-2024-53704: SSL VPN Session Hijacking
Feb 10, 2025
By Jon Williams
From Dial Tone to Throne: IVR Testing in the Spirit of The King of NYNEX
Feb 5, 2025
By Alethe Denis
Hacking the Norm: Unique Career Journeys into Cybersecurity
Jan 30, 2025
By Gerben Kleijn, Nathan Elendt, Katie Ritchie
Cosmos Series Part 4: Results-Oriented Critical Thinking
Jan 21, 2025
By Aaron Symanski
raink: Use LLMs for Document Ranking
Jan 14, 2025
By Caleb Gross
Navigating Workplace Security: Red Team Insights for the Return to Office
Jan 10, 2025
By Alethe Denis
Cyber Mirage: How AI is Shaping the Future of Social Engineering
Jan 8, 2025
By Brandon Kovacs
Cosmos Series Part 3: The Importance of Automation
Jan 7, 2025
By Aaron Symanski
Cosmos Series Part 2: Outcome-driven for Features and Capabilities
Dec 31, 2024
By Aaron Symanski
Cosmos Series Part 1: Principles for the New Platform
Dec 17, 2024
By Aaron Symanski
Current State of SonicWall Exposure: Firmware Decryption Unlocks New Insights
Dec 13, 2024
By Bishop Fox Researchers
Our Favorite Pen Testing Tools: 2024 Edition
Dec 12, 2024
By Bishop Fox Researchers
Bishop Fox ASM Delivers 24-Hour Head Start Against Critical PAN-OS Vulnerability
Dec 9, 2024
By Caleb Gross
Sonicwall Firmware Deep Dive - SWI Firmware Decryption
Dec 2, 2024
By Bishop Fox Researchers
The Growing Concern of API Security
Nov 27, 2024
By Robert Punnett, Nicholas Beacham
Application Pen Testing: Point-In-Time vs Ongoing Approaches Explained
Nov 7, 2024
By Bishop Fox
A Brief Look at FortiJump (FortiManager CVE-2024-47575)
Nov 1, 2024
By Bishop Fox Researchers
Off the Fox Den Bookshelf: Security and Tech Books We Love
Oct 15, 2024
By Bishop Fox Researchers
Broken Hill: A Productionized Greedy Coordinate Gradient Attack Tool for Use Against Large Language Models
Sep 24, 2024
By Ben Lincoln
Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing
Sep 17, 2024
By Bishop Fox Researchers
Exploring Large Language Models: Local LLM CTF & Lab
Sep 11, 2024
By Derek Rush
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.