AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Customer header bg dark

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Security Perspective

Organized: The Kingpins of Cybercrime

Organized: The Kingpins of Cybercrime

Jul 14, 2022

In this blog, learn about the transformations that cybercrime groups have undergone and why potential victims should pay attention.

By Beth Robinson

Advisory

Netwrix Auditor Advisory

Netwrix Auditor Advisory

Jul 13, 2022

The Netwrix Auditor application is affected by an insecure object deserialization issue that allows an attacker to execute arbitrary code with the privileges of the affected service.

By Jordan Parkin

Culture

Capture the Flag to Advance Your Hacking Skills

Capture the Flag to Advance Your Hacking Skills

Jul 12, 2022

In this blog, learn why our Foxes enjoy participating in Capture the Flag (CTF) competitions and how it complements their career goals.

By Carlos Cañedo

Security Perspective

Veterans of the Fox Den

Veterans of the Fox Den

Jul 4, 2022

Today (and everyday) is the perfect occasion to celebrate our Veterans of the Fox Den. Learn how our veterans served their nation and found cybersecurity as a civilian career path.

By Beth Robinson

Technical Research

An Introduction to Bluetooth Security

An Introduction to Bluetooth Security

Jun 27, 2022

Check out our latest blog to learn about Bluetooth Low Energy (BLE) - the BLE stack, how to pen test against it, and why you should get familiar with this technology.

By Saul Arias Mendez

Advisory

FileStack Upload Advisory

FileStack Upload Advisory

Jun 23, 2022

The FileStack Upload application is affected by a cross-site scripting (XSS) vulnerability that allows an attacker to upload SVG files with JavaScript code inside them.

By Carlos Yanez

Security Perspective

A 2022 RSA Conference Recap: IRL Edition

A 2022 RSA Conference Recap: IRL Edition

Jun 21, 2022

Didn't make it to RSA 2022? Or haven't had a chance to use your virtual pass? No problem! Check out our blog recap highlighting our favorite sessions and what we loved about them.

By Britt Kemp

Security Perspective

Stepping into the Spotlight at Security Conferences

Stepping into the Spotlight at Security Conferences

Jun 13, 2022

In this blog, we share tips and tricks for how to get involved at security conferences, including which events are our favorite, how to submit CFPs, and tips for enhancing speaking presentations.

By Britt Kemp

Technical Research

Using CloudTrail to Pivot to AWS Accounts

Using CloudTrail to Pivot to AWS Accounts

Jun 7, 2022

In this blog, we look at how we can utilize the AWS CloudTrail service to discover other AWS accounts that we could pivot to.

By Gerben Kleijn

Technical Research

ripgen: Taking the Guesswork Out of Subdomain Discovery

ripgen: Taking the Guesswork Out of Subdomain Discovery

Jun 1, 2022

ripgen is a super-fast subdomain permutation discovery tool that helps map the full scope of an attack surface. Learn how our Cosmos team uses ripgen to uncover unknown subdomain findings in our clients' environments.

By Justin Rhinehart, Joe Sechman

Technical Research

Call of DeFi: The Battleground of Blockchain

Call of DeFi: The Battleground of Blockchain

May 24, 2022

Last year, decentralized finance (DeFi) grew tremendously, not only in usage, but also in cybersecurity attack. To understand the risks of these new blockchain technologies and use cases, we analyzed the main hacks that occurred in 2021.

By Dylan Dubief

Technical Research

Ruby Vulnerabilities: Exploiting Dangerous Open, Send and Deserialization Operations

Ruby Vulnerabilities: Exploiting Dangerous Open, Send and Deserialization Operations

May 17, 2022

Managing Sr. Consultant Ben Lincoln tested a Ruby on Rails application that was vulnerable to three of the most common types of Ruby-specific RCE vulnerabilities. Here is a walkthrough and new test harness that you can use to enable more efficient web application exploitation.

By Ben Lincoln

Advisory

CVE-2022-1388: Scan BIG-IP for Exact Release Versions

CVE-2022-1388: Scan BIG-IP for Exact Release Versions

May 10, 2022

Worried about your BIG-IP devices and if they are impacted by CVE-2022-1388? We built a scanner that can help you quickly determine if they are running versions that need to be patched. Check it out!

By Caleb Gross

Security Perspective

Getting Schooled in Security: Bishop Fox Academy

Getting Schooled in Security: Bishop Fox Academy

May 10, 2022

We recently launched Bishop Fox Academy, a company-wide career development and continuous learning program to uphold our position as an offensive security leader.

By Andrew Wilson

Security Perspective

The Foxes of Mexico: A Security Roundtable

The Foxes of Mexico: A Security Roundtable

May 1, 2022

In honor of Dia del Trabajo (Labor Day) on May 1, we talked to Foxes in Mexico about their cybersecurity journeys, life at Bishop Fox, Mexico as a tech leader, and any advice they have to fellow Mexicans who want to join the industry.

By Beth Robinson

Security Perspective

Ransomware: How Adversaries are Upping the Ante

Ransomware: How Adversaries are Upping the Ante

Apr 27, 2022

During the last few years, no other cyber threat has dominated headlines as much as ransomware, with SANS even declaring 2020 and 2021 “the years of ransomware”. Explore the latest ransomware trends, including ransomware as decoys, RaaS, and attacks on supply chains.

By Trevin Edgeworth

Technical Research

Our Top 9 Favorite Fuzzers

Our Top 9 Favorite Fuzzers

Apr 19, 2022

In keeping with our new tradition of crowdsourcing pen testing tool topics, it became clear that you wanted more on fuzzing! Learn which fuzzing tools are our pen testers' favorites to add to your security toolbox.

By Britt Kemp

Culture

Cybersecurity Mentors: Why & How to Find Your Match

Cybersecurity Mentors: Why & How to Find Your Match

Apr 12, 2022

We dispel some misconceptions of finding a mentor and provide some straightforward ideas for developing a mentor-mentee relationship, no matter the stage of your career.

By Britt Kemp

Technical Research

Nuclei: Packing a Punch with Vulnerability Scanning

Nuclei: Packing a Punch with Vulnerability Scanning

Apr 5, 2022

Nuclei is one of our favorite tools to run more speedy, efficient, customized, AND accurate multi-protocol vulnerability scanning. Learn how our teams use this tool to uncover risks in our clients' environments.

By Matt Thoreson, David Bravo, Zach Zeitlin, Sandeep Singh

Culture

Cyber Talent: Exploring the Ongoing Shortage & Great Resignation

Cyber Talent: Exploring the Ongoing Shortage & Great Resignation

Mar 29, 2022

See how talent shortage and the Great Resignation movement is impacting the cybersecurity workforce, and learn how Bishop Fox approaches recruiting and retention of cybersecurity talent.

By Beth Robinson

Technical Research

Reports from the Field: Part 3

Reports from the Field: Part 3

Mar 22, 2022

In the third part of our “Reports from the Field” series, we’ll explore how attackers utilize all tools available (including open source) to dig for an exploit.

By Wes Hutcherson

Culture

Women of the Fox Den: A Security Roundtable

Women of the Fox Den: A Security Roundtable

Mar 15, 2022

In honor of Women’s History Month and the paths ladies are forging in cybersecurity, we talked to Foxes about their cybersecurity journeys, their experiences at Bishop Fox, and any advice they have to other women who may be new to the field.

By Britt Kemp

Technical Research

Reports from the Field: Part 2

Reports from the Field: Part 2

Mar 8, 2022

In the second part of our “Reports from the Field” series, we’ll explore exposed configuration files. If you want to check out our first part on reused credentials, visit: Reports from the Field, Part 1.

By Wes Hutcherson

Technical Research

Reports from the Field: Part 1

Reports from the Field: Part 1

Mar 1, 2022

In this three-part series, we’ll describe real-world examples that showcase how perceived ‘low-risk’ vulnerabilities can turn into critical, business-impacting issues – especially through attack chaining.

By Wes Hutcherson

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.