AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Customer header bg dark

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Security Perspective

Offensive Security Under the EU Digital Operational Resilience Act (DORA)

Offensive Security Under the EU Digital Operational Resilience Act (DORA)

Aug 28, 2024

Explore the EU's new DORA regulation and how financial entities and their ICT vendors must promptly align their security frameworks with DORA's requirements to mitigate potential risks and ensure operational stability.

By Harley Geiger

Security Perspective

Manipulating the Mind: The Strategy and Practice of Social Engineering

Manipulating the Mind: The Strategy and Practice of Social Engineering

Aug 13, 2024

Explore the intricacies of social engineering, explore its various forms, and describe how adversaries set, define, and achieve objectives leveraging social engineering tactics and strategies.

By Alethe Denis

Security Perspective

Adversarial Controls Testing: A Step to Cybersecurity Resilience

Adversarial Controls Testing: A Step to Cybersecurity Resilience

Aug 1, 2024

Take an in-depth look at Adversarial Controls Testing assessments (ACT), an offensive security testing approach that evaluates the effectiveness of an organization's email, endpoint, and network security controls by simulating real-world attacks.

By Bishop Fox Researchers

Security Perspective

Leveraging Offensive Security for Effective Post-Attack Recovery

Leveraging Offensive Security for Effective Post-Attack Recovery

Jul 17, 2024

Bishop Fox's CISO Christie Terrill and former VP of Consulting Tom Eston discuss leveraging offensive security strategies for effective post-attack recovery, providing practical steps for remediation and building long-term cyber resilience.

By Bishop Fox Researchers

Technical Research

Product Security Review Methodology for Traeger Grill Hack

Product Security Review Methodology for Traeger Grill Hack

Jul 2, 2024

Read for an in-depth analysis of the Traeger Grill hack, uncovering the vulnerabilities that could compromise your grill's security and how they were addressed.

By Nick Cerne

Advisory

Traeger Grill D2 Wi-Fi Controller, Version 2.02.04

Traeger Grill D2 Wi-Fi Controller, Version 2.02.04

Jul 2, 2024

Discover critical vulnerabilities in the Traeger Grill D2 Wi-Fi Controller that could impact your grill's security. Read our advisory to learn about the issues identified.

By Nick Cerne

Advisory

ExpressionEngine, Version 7.3.15

ExpressionEngine, Version 7.3.15

Jun 17, 2024

Bishop Fox staff identified two vulnerabilities in Packet Tide’s ExpressionEngine version 7.3.15. The most severe issue allowed Bishop Fox staff to obtain access to a new administrator account in an instance of ExpressionEngine.

By Matthieu Keller

Security Perspective

How Does Social Engineering Work? From Planning to Execution

How Does Social Engineering Work? From Planning to Execution

Jun 14, 2024

Discover the key points from our webcast, "How Does Social Engineering Work? in this recap blog.

By Bishop Fox Researchers

Technical Research

The Unmask IAM Permission: API Gateway Access Logging

The Unmask IAM Permission: API Gateway Access Logging

Jun 6, 2024

Unlock the secrets to securing your AWS environment! Learn the intricacies of IAM permissions and how to protect your Amazon API Gateway access logs.

By Chris Scrivana

Security Perspective

Strengthen Security to Mitigate Third-Party Risks

Strengthen Security to Mitigate Third-Party Risks

May 29, 2024

Explore highlights from a recent webcast where special guest Anirban Banerjee, CEO and co-founder of partner Riscosity, and Matt Twells, senior solutions architect, explore critical considerations for developing a security program that prioritizes third-party risk reduction.

By Matt Twells

Advisory

OOB Memory Read: Netscaler ADC and Gateway

OOB Memory Read: Netscaler ADC and Gateway

May 6, 2024

The affected Citrix NetScaler components are used for Authentication, Authorization, and Auditing (AAA), and remote access. The latest version of NetScaler is 14.1-21.15, released on April 23, 2024.

By Bishop Fox Researchers

Culture

Which Star Wars Character Fits Your Cybersecurity Style?

Which Star Wars Character Fits Your Cybersecurity Style?

Apr 30, 2024

We’re asking the big question: Which Star Wars Characters Would Make Great Cybersecurity Professionals?

By Sean McMillan

Technical Research

PAN-OS CVE-2024-3400: Patch Your Palo Alto Firewalls

PAN-OS CVE-2024-3400: Patch Your Palo Alto Firewalls

Apr 19, 2024

Bishop Fox shares limited details about mitigation bypasses for PAN-OS CVE-2024-3400 in an effort to be maximally useful for defenders, while minimally useful for opportunistic attackers.

By Bishop Fox Researchers

Security Perspective

Technology and Software: 2023 Insights From the Ponemon Institute

Technology and Software: 2023 Insights From the Ponemon Institute

Apr 2, 2024

Gain cutting edge insights into offensive security strategies used by the Technology & Software industry.

By Beth Robinson

Security Perspective

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Apr 1, 2024

Gain insights into how enterprises can take a pragmatic and informed approach to AI and LLM technology adoption, ensuring reduced security risks.

By Bishop Fox Researchers

Technical Research

The iSOON Disclosure: Exploring the Integrated Operations Platform

The iSOON Disclosure: Exploring the Integrated Operations Platform

Mar 21, 2024

In this blog, examine the iSoon data disclosure from an offensive security perspective.

By Bishop Fox Researchers

Technical Research

Poisoned Pipeline Execution Attacks: A Look at CI-CD Environments

Poisoned Pipeline Execution Attacks: A Look at CI-CD Environments

Mar 19, 2024

In this blog, we examine three types of poisoned pipeline execution (PPE) attacks, methods to exploit these types of vulnerabilities, and recommended preventive measures.

By Sebastian Guerrero

Security Perspective

Implementing the FDA's 2023 Requirements for Medical Device Cybersecurity

Implementing the FDA's 2023 Requirements for Medical Device Cybersecurity

Mar 12, 2024

Gain actionable tips to operationalize the FDA's 2023 legislation, H.R. 2617 Section 524B product security requirements for medical devices.

By Matt Twells

Technical Research

Further Adventures in Fortinet Decryption

Further Adventures in Fortinet Decryption

Mar 8, 2024

In this blog, we examine how the new Fortinet encryption scheme works and provide a tool to decrypt the root filesystem for x86-based FortiOS images.

By Bishop Fox Researchers

Technical Research

CVE-2024-21762 Vulnerability Scanner for FortiGate Firewalls

CVE-2024-21762 Vulnerability Scanner for FortiGate Firewalls

Mar 1, 2024

Discover vulnerable FortiGate firewalls with the Bishop Fox CVE-2024-21762 vulnerability scanner.

By Bishop Fox Researchers

Culture

Unlocking Job Opportunities with LinkedIn and Artificial Intelligence

Unlocking Job Opportunities with LinkedIn and Artificial Intelligence

Feb 28, 2024

Learn how to upgrade your job search in LinkedIn with helpful AI prompts and tips from an industry-leading recruiter.

By Kaitlin O'Neil

Culture

El Programa de Interns de Bishop Fox: Foxes de México Assemble!

El Programa de Interns de Bishop Fox: Foxes de México Assemble!

Feb 16, 2024

En Bishop Fox, siempre estamos buscando crear la próxima generación de Avengers de la seguridad ofensiva a través de nuestro innovador internship program.

By Lesley Mugford

Culture

The Bishop Fox Internship Program: Mexico Foxes Assemble!

The Bishop Fox Internship Program: Mexico Foxes Assemble!

Feb 15, 2024

Learn about our internship program for Mexico-based penetration testers.

By Lesley Mugford

Security Perspective

Enabling Proper PCI Testing with External Penetration Tests

Enabling Proper PCI Testing with External Penetration Tests

Feb 14, 2024

Gain actionable insights on how to maximize external penetration testing to develop comprehensive PCI security strategies.

By Derek Rush

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.