AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Customer header bg dark

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Security Perspective

Hello World! Introducing the Bishop Fox Cybersecurity Style Guide

Hello World! Introducing the Bishop Fox Cybersecurity Style Guide

Feb 15, 2018

The Bishop Fox cybersecurity style guide is a one-of-a-kind resource that bridges the gap between the infosec industry and the general public. This invaluable resource is available for download at our

By Brianne Hughes, Catherine Lu

Security Perspective

My Time at NetWars Tournament of Champions

My Time at NetWars Tournament of Champions

Jan 24, 2018

Security Analyst Kelly Albrink got the chance to compete at SANS Rocky Mountain NetWars.

By Kelly Albrink

Security Perspective

Your Worst Case Scenario: An Introduction to Threat Modeling

Your Worst Case Scenario: An Introduction to Threat Modeling

Dec 11, 2017

A threat modeling how-to authored by Bishop Fox's Joe Ward. Learn how your organization can start implementing this important (but simple) process.

By Joe Ward

Technical Research

Stand Your Cloud #3: AWS Provisioning and Access Requests

Stand Your Cloud #3: AWS Provisioning and Access Requests

Nov 14, 2017

AWS security can often be achieved thanks to proper provisioning + access requests. In this write-up, Gerben Kleijn explores how to handle these processes.

By Gerben Kleijn

Technical Research

A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client

A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client

Oct 10, 2017

A bug has no name - multiple heap buffer overflows in windows dns client - CVE-2017-11779 was fixed by Microsoft in October of 2017. This bug was discovered by Bishop Fox's consultant, Nick Freeman.

By Nick Freeman

Advisory

Windows DNS Client – Memory Corruption Vulnerabilities

Windows DNS Client – Memory Corruption Vulnerabilities

Oct 10, 2017

CVE-2017-11779 could lead to takeover of user’s device - this technical write-up covers implications, the actual exploit, and remediation steps.

By Nick Freeman

Culture

My Life at Bishop Fox

My Life at Bishop Fox

Sep 15, 2017

I’m picky about where I work. I don’t like companies that seem to run an internship program simply because everyone else has one. Bishop Fox proved to me that it’s possible to find an impactful, rewarding, and fun internship outside of the traditional options.

By Alex Lynch

Technical Research

Is CORS Becoming Obsolete?

Is CORS Becoming Obsolete?

Sep 6, 2017

CORS is not obsolete as feared - but rather, it's become part of a larger standard known as FETCH.

By Tim Sapio

Technical Research

Hot New ‘Anonymous’ Chat App Hijacks Millions of Contact Data

Hot New ‘Anonymous’ Chat App Hijacks Millions of Contact Data

Aug 28, 2017

Sarahah, the chat app marketed as being "anonymous," has a disturbing secret - a Sarahah leak may endanger the contact info of possibly millions of users.

By Zach Julian

Security Perspective

Bug Bounties & Beyond: An Interview With HackerOne's Mårten Mickos

Bug Bounties & Beyond: An Interview With HackerOne's Mårten Mickos

Aug 23, 2017

In this Marten Mickos interview, Vincent Liu chats with HackerOne's CEO on his beliefs in transparency and the changing face of the security industry.

By Vincent Liu

Technical Research

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

Aug 3, 2017

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

By Francis Brown

Technical Research

How I Built An XSS Worm On Atmail

How I Built An XSS Worm On Atmail

Jun 23, 2017

Read an account of creating an XSS worm on a popular email hosting service provider.

By Zach Julian

Advisory

atmail 7 Stored XSS Vulnerability

atmail 7 Stored XSS Vulnerability

Jun 23, 2017

A stored XSS vulnerability was identified in the webmail component of atmail 7. This security advisory by Zach Julian discusses it in detail.

By Zach Julian

Security Perspective

What the Newly Drafted NIST Password Guidelines Mean to You

What the Newly Drafted NIST Password Guidelines Mean to You

May 30, 2017

Nathan Elendt breaks down implications of the newly drafted NIST password guidelines in this post. Learn how your organization can best harness them.

By Nathan Elendt

Technical Research

How We Can Stop Email Spoofing

How We Can Stop Email Spoofing

May 23, 2017

Email spoofing is an antiquated attack that 98 percent of the internet is vulnerable to - even in the modern age. Defend yourself with our tool, SpoofCheck.

By Alex DeFreese

Advisory

SolarWinds Log & Event Manager - Improper Access Control

SolarWinds Log & Event Manager - Improper Access Control

May 12, 2017

An improper access control vulnerability was discovered by Baker Hamilton in the SolarWinds’ Log & Event Manager (LEM) management console (CMC).

By Baker Hamilton

Advisory

SolarWinds Log & Event Manager - Arbitrary Command Injection

SolarWinds Log & Event Manager - Arbitrary Command Injection

May 12, 2017

The Bishop Fox assessment team discovered an arbitrary command injection vulnerability within the SolarWinds’ Log & Event Manager (LEM) management console (CMC).

By Baker Hamilton

Security Perspective

A Guide to Choosing the Right VPN

A Guide to Choosing the Right VPN

Apr 6, 2017

Read Bishop Fox's VPN guide before making a VPN choice for the privacy of your browsing experience.

By Kevin Sugihara

Technical Research

The CIA Leak: A Look On the Bright Side...

The CIA Leak: A Look On the Bright Side...

Mar 8, 2017

A closer examination of the CIA Leak: Don’t get lost in the hype. There is a bright side to strife...

By Dan Petro

Technical Research

In the News: A BGP Hijacking Technical Post-Mortem

In the News: A BGP Hijacking Technical Post-Mortem

Jan 18, 2017

BGP hijacking was utilized by the Iranian government in early January 2016. In this microblog, Zach Julian analyzes the technical implications of the event.

By Zach Julian

Advisory

Cisco Jabber Guest Server HTTP URL Redirection Vulnerability

Cisco Jabber Guest Server HTTP URL Redirection Vulnerability

Dec 21, 2016

A vulnerability in the Cisco Jabber Guest Server could allow an unauthenticated, remote attacker to initiate connections to arbitrary hosts.

By Jake Miller

Security Perspective

Star Wars: I Find Your Lack of Segmentation Disturbing

Star Wars: I Find Your Lack of Segmentation Disturbing

Dec 4, 2016

Was a lack of network segmentation what foiled the Empire? According to Fran Brown, it was. Right in time for "Star Wars: Rogue One," here is his take.

By Francis Brown

Technical Research

A Guide to Do-It-Yourself Network Segmentation

A Guide to Do-It-Yourself Network Segmentation

Nov 30, 2016

Want to keep your network secure? Working with a shoestring budget? Check out our do-it-yourself network segmentation guide.

By Cory Johnson

Security Perspective

Telling the Security Story: An Interview with Josh Koplik

Telling the Security Story: An Interview with Josh Koplik

Nov 10, 2016

Josh Koplik is the CISO for IAC as well as the subject of Vincent Liu's latest cybersecurity expert interview. Read their conversation here.

By Vincent Liu

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.