AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Abstract cybersecurity illustration featuring servers, network nodes, and stylized attack indicators representing penetration testing and threat activity.

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Advisory

Windows DNS Client – Memory Corruption Vulnerabilities

Windows DNS Client – Memory Corruption Vulnerabilities

Oct 10, 2017

CVE-2017-11779 could lead to takeover of user’s device - this technical write-up covers implications, the actual exploit, and remediation steps.

By Nick Freeman

Culture

My Life at Bishop Fox

My Life at Bishop Fox

Sep 15, 2017

I’m picky about where I work. I don’t like companies that seem to run an internship program simply because everyone else has one. Bishop Fox proved to me that it’s possible to find an impactful, rewarding, and fun internship outside of the traditional options.

By Alex Lynch

Technical Research

Is CORS Becoming Obsolete?

Is CORS Becoming Obsolete?

Sep 6, 2017

CORS is not obsolete as feared - but rather, it's become part of a larger standard known as FETCH.

By Tim Sapio

Technical Research

Hot New ‘Anonymous’ Chat App Hijacks Millions of Contact Data

Hot New ‘Anonymous’ Chat App Hijacks Millions of Contact Data

Aug 28, 2017

Sarahah, the chat app marketed as being "anonymous," has a disturbing secret - a Sarahah leak may endanger the contact info of possibly millions of users.

By Zach Julian

Industry

Bug Bounties & Beyond: An Interview With HackerOne's Mårten Mickos

Bug Bounties & Beyond: An Interview With HackerOne's Mårten Mickos

Aug 23, 2017

In this Marten Mickos interview, Vincent Liu chats with HackerOne's CEO on his beliefs in transparency and the changing face of the security industry.

By Vincent Liu

Technical Research

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

Aug 3, 2017

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

By Francis Brown

Technical Research

How I Built An XSS Worm On Atmail

How I Built An XSS Worm On Atmail

Jun 23, 2017

Read an account of creating an XSS worm on a popular email hosting service provider.

By Zach Julian

Advisory

atmail 7 Stored XSS Vulnerability

atmail 7 Stored XSS Vulnerability

Jun 23, 2017

A stored XSS vulnerability was identified in the webmail component of atmail 7. This security advisory by Zach Julian discusses it in detail.

By Zach Julian

Industry

What the Newly Drafted NIST Password Guidelines Mean to You

What the Newly Drafted NIST Password Guidelines Mean to You

May 30, 2017

Nathan Elendt breaks down implications of the newly drafted NIST password guidelines in this post. Learn how your organization can best harness them.

By Nathan Elendt

Technical Research

How We Can Stop Email Spoofing

How We Can Stop Email Spoofing

May 23, 2017

Email spoofing is an antiquated attack that 98 percent of the internet is vulnerable to - even in the modern age. Defend yourself with our tool, SpoofCheck.

By Alex DeFreese

Advisory

SolarWinds Log & Event Manager - Improper Access Control

SolarWinds Log & Event Manager - Improper Access Control

May 12, 2017

An improper access control vulnerability was discovered by Baker Hamilton in the SolarWinds’ Log & Event Manager (LEM) management console (CMC).

By Baker Hamilton

Advisory

SolarWinds Log & Event Manager - Arbitrary Command Injection

SolarWinds Log & Event Manager - Arbitrary Command Injection

May 12, 2017

The Bishop Fox assessment team discovered an arbitrary command injection vulnerability within the SolarWinds’ Log & Event Manager (LEM) management console (CMC).

By Baker Hamilton

Industry

A Guide to Choosing the Right VPN

A Guide to Choosing the Right VPN

Apr 6, 2017

Read Bishop Fox's VPN guide before making a VPN choice for the privacy of your browsing experience.

By Kevin Sugihara

Technical Research

The CIA Leak: A Look On the Bright Side...

The CIA Leak: A Look On the Bright Side...

Mar 8, 2017

A closer examination of the CIA Leak: Don’t get lost in the hype. There is a bright side to strife...

By Dan Petro

Technical Research

In the News: A BGP Hijacking Technical Post-Mortem

In the News: A BGP Hijacking Technical Post-Mortem

Jan 18, 2017

BGP hijacking was utilized by the Iranian government in early January 2016. In this microblog, Zach Julian analyzes the technical implications of the event.

By Zach Julian

Advisory

Cisco Jabber Guest Server HTTP URL Redirection Vulnerability

Cisco Jabber Guest Server HTTP URL Redirection Vulnerability

Dec 21, 2016

A vulnerability in the Cisco Jabber Guest Server could allow an unauthenticated, remote attacker to initiate connections to arbitrary hosts.

By Jake Miller

Industry

Star Wars: I Find Your Lack of Segmentation Disturbing

Star Wars: I Find Your Lack of Segmentation Disturbing

Dec 4, 2016

Was a lack of network segmentation what foiled the Empire? According to Fran Brown, it was. Right in time for "Star Wars: Rogue One," here is his take.

By Francis Brown

Technical Research

A Guide to Do-It-Yourself Network Segmentation

A Guide to Do-It-Yourself Network Segmentation

Nov 30, 2016

Want to keep your network secure? Working with a shoestring budget? Check out our do-it-yourself network segmentation guide.

By Cory Johnson

Industry

Telling the Security Story: An Interview with Josh Koplik

Telling the Security Story: An Interview with Josh Koplik

Nov 10, 2016

Josh Koplik is the CISO for IAC as well as the subject of Vincent Liu's latest cybersecurity expert interview. Read their conversation here.

By Vincent Liu

Advisory

Accellion Kiteworks Multiple Vulnerabilities

Accellion Kiteworks Multiple Vulnerabilities

Sep 8, 2016

Three vulnerabilities were discovered in the Accellion Kiteworks appliance. The three vulnerabilities are described in this Bishop Fox security advisory.

By Shubham Shah

Industry

What Security Leaders Can Learn About Decision-Making

What Security Leaders Can Learn About Decision-Making

Aug 24, 2016

In our latest cybersecurity leaders feature, Richard Seiersen from GE Healthcare shares his decision making philosophy with Bishop Fox's Vincent Liu.

By Vincent Liu

Technical Research

Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

Aug 10, 2016

Bishop Fox's Dan Petro explains the creation of his SmashBot AI character and how he implemented time-honored hacker techniques in the development process.

By Dan Petro

Industry

How to Engineer Secure Things: Past Mistakes and Future Advice

How to Engineer Secure Things: Past Mistakes and Future Advice

Jun 15, 2016

Internet of Things security often is an afterthought. Nathan Elendt chronicles the do's and do nots of how engineers can create secure connected devices.

By Nathan Elendt

Industry

The Power of 'Agile' Security at Dun & Bradstreet

The Power of 'Agile' Security at Dun & Bradstreet

Jun 1, 2016

Dun & Bradstreet CSO dishes on agile security and how it transformed his security program - and eventually, the entire business.

By Vincent Liu

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.