AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Abstract cybersecurity illustration featuring servers, network nodes, and stylized attack indicators representing penetration testing and threat activity.

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Advisory

Eaton UPS 9PX 8000 SP - Multiple Vulnerabilities

Eaton UPS 9PX 8000 SP - Multiple Vulnerabilities

Oct 19, 2018

Bishop Fox researchers identified three security vulnerabilities in the Eaton power management appliance manufactured by Eaton Corporation Plc.

By Kelly Albrink

Advisory

SV3C L-Series HD Camera – Multiple Vulnerabilities

SV3C L-Series HD Camera – Multiple Vulnerabilities

Oct 16, 2018

This security advisory describes several vulnerabilities found in the SV3C L-Series HD Camera, version 2.3.4.2103-S50-NTD-B20170823B and below.

By Jefferino Siqueria

Industry

My Path to Security - How Gerben Kleijn Got Into Security

My Path to Security - How Gerben Kleijn Got Into Security

Oct 11, 2018

Learn how Gerben Kleijn - a Bishop Fox Managing Consultant - got his start in an infosec career, which ultimately took him to his current job at Bishop Fox.

By Bishop Fox

Advisory

Wallabag 2.2.3 to 2.3.2 - Stored Cross-Site Scripting

Wallabag 2.2.3 to 2.3.2 - Stored Cross-Site Scripting

Sep 17, 2018

Wallabag is an open source RSS reader application, distributed under an MIT license. A Bishop Fox researcher identified a stored cross-site scripting vulnerability in it.

By Florian Nivette

Advisory

Subsonic 6.1.1 - Multiple Vulnerabilities

Subsonic 6.1.1 - Multiple Vulnerabilities

Sep 17, 2018

Florian Nivette identified several vulnerabilities in Subsonic, an open source web media server that enables the management of media resources.

By Florian Nivette

Advisory

CremeCRM 1.6.12 - Multiple Vulnerabilities

CremeCRM 1.6.12 - Multiple Vulnerabilities

Aug 30, 2018

Two vulnerabilities were identified in CremeCRM: 29 instances of stored cross-site scripting and one instance of reflected link manipulation.

By Florian Nivette

Technical Research

An Introduction to AWS Cloud Security

An Introduction to AWS Cloud Security

Aug 28, 2018

If you're a newcomer to the slightly intimidating world of AWS cloud security, let this primer by Bishop Fox serve as your first jump into a world that you can navigate with some time and patience.

By Gerben Kleijn

Industry

Password Security: The Good, the Bad, and the "Never Should Have Happened"

Password Security: The Good, the Bad, and the

Aug 16, 2018

This Bishop Fox guide to password security will help inform your organization's password policy procedures.

By Candis Orr

Industry

A Primer to Red Teaming

A Primer to Red Teaming

Jul 31, 2018

Is red teaming right for your organization? What do you need to be successful? What's the difference between a blue team and a red team - or even a red team and a purple team? Find out in this guide

By MJ Keith

Industry

My Path to Security - How Matt Frost Got Into Cybersecurity

My Path to Security - How Matt Frost Got Into Cybersecurity

Jul 20, 2018

Read about how Senior Security Consultant Matt Frost got his start in infosec - and his start at Bishop Fox.

By Bishop Fox

Industry

How 'Small' Security Errors Lead to a Security Breach

How 'Small' Security Errors Lead to a Security Breach

Jul 16, 2018

In the wake of the Timehop breach, the social media aggregator chose a transparent approach in disclosure. Bishop Fox partnered with them in this guide and case study on how small cybersecurity errors

By Alex DeFreese

Technical Research

A Guide to AWS S3 Buckets Security

A Guide to AWS S3 Buckets Security

Jul 10, 2018

The blog post serving as an intro to our guide on AWS S3 buckets security best practices. Download our guide for more technical information on how you can keep your AWS environment safe.

By Gerben Kleijn

Industry

WPA3 Is a Major Missed Opportunity: Here's Why

WPA3 Is a Major Missed Opportunity: Here's Why

Jun 30, 2018

The announced WPA3 is a well-intentioned attempt at strengthening open Wi-Fi security, but it's not enough. Dan Petro describes the problem and possible solutions.

By Dan Petro

Technical Research

Why You Need IDontSpeakSSL in Your Life

Why You Need IDontSpeakSSL in Your Life

Jun 26, 2018

Get the scoop on IDontSpeakSSL, the network pentesting tool created by Bishop Fox's Florian Nivette. To read about how it works, check out the blog post which explains the difference between it and it

By Florian Nivette

Industry

My Path to Security - How Kelly Albrink Got Into Security

My Path to Security - How Kelly Albrink Got Into Security

Jun 15, 2018

Former art dealer Kelly Albrink is a self-taught infosec professional hailing from a one-of-a-kind background. Learn how she got into infosec in this blog post.

By Kelly Albrink

Technical Research

Server-Side Spreadsheet Injection - Formula Injection to Remote Code Execution

Server-Side Spreadsheet Injection - Formula Injection to Remote Code Execution

Jun 11, 2018

Bishop Fox's Jake Miller explains server-side spreadsheet injection, an attack vector based on CSV injection, in this technical write-up based off his Empire Hacking Meetup presentation.

By Jake Miller

Advisory

Jirafeau Version 3.3.0 – Multiple Vulnerabilities

Jirafeau Version 3.3.0 – Multiple Vulnerabilities

Jun 6, 2018

Bishop Fox researcher Florian Nivette identified multiple vulnerabilities in Jirafeau Version 3.3.0. This write-up discusses the exploits and their implications.

By Florian Nivette

Advisory

SolarWinds Serv-U Managed File Transfer – Insufficient Session ID Entropy

SolarWinds Serv-U Managed File Transfer – Insufficient Session ID Entropy

May 14, 2018

This security advisory describes a high-risk vulnerability found by Bishop Fox researcher Baker Hamilton in SolarWinds Serv-U Managed File Transfer.

By Baker Hamilton

Advisory

SolarWinds Serv-U Managed File Transfer – Denial of Service

SolarWinds Serv-U Managed File Transfer – Denial of Service

May 11, 2018

This Bishop Fox security advisory details a denial-of-service vulnerability in SolarWinds Serv-U 15.1.6.25.

By Baker Hamilton

Industry

Hello World! Introducing the Bishop Fox Cybersecurity Style Guide

Hello World! Introducing the Bishop Fox Cybersecurity Style Guide

Feb 15, 2018

The Bishop Fox cybersecurity style guide is a one-of-a-kind resource that bridges the gap between the infosec industry and the general public. This invaluable resource is available for download at our

By Brianne Hughes, Catherine Lu

Industry

My Time at NetWars Tournament of Champions

My Time at NetWars Tournament of Champions

Jan 24, 2018

Security Analyst Kelly Albrink got the chance to compete at SANS Rocky Mountain NetWars.

By Kelly Albrink

Industry

Your Worst Case Scenario: An Introduction to Threat Modeling

Your Worst Case Scenario: An Introduction to Threat Modeling

Dec 11, 2017

A threat modeling how-to authored by Bishop Fox's Joe Ward. Learn how your organization can start implementing this important (but simple) process.

By Joe Ward

Technical Research

Stand Your Cloud #3: AWS Provisioning and Access Requests

Stand Your Cloud #3: AWS Provisioning and Access Requests

Nov 14, 2017

AWS security can often be achieved thanks to proper provisioning + access requests. In this write-up, Gerben Kleijn explores how to handle these processes.

By Gerben Kleijn

Technical Research

A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client

A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client

Oct 10, 2017

A bug has no name - multiple heap buffer overflows in windows dns client - CVE-2017-11779 was fixed by Microsoft in October of 2017. This bug was discovered by Bishop Fox's consultant, Nick Freeman.

By Nick Freeman

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.