AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Abstract cybersecurity illustration featuring servers, network nodes, and stylized attack indicators representing penetration testing and threat activity.

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Industry

LinkedIn 'Intro'duces Insecurity

LinkedIn 'Intro'duces Insecurity

Oct 23, 2013

LinkedIn Intro was released in 2013 - and came with a lot of security issues. We investigated the mobile app's security shortcomings in this blog post.

By Carl Livitt

Technical Research

Quick Intro to NotInMyBackYard Diggity

Quick Intro to NotInMyBackYard Diggity

Sep 1, 2013

NotInMyBackYard Diggity is part of the larger Google Hacking Diggity Project. Read our blog post to learn what it can do for you.

By Francis Brown

Industry

Guide to Hardening Your Firefox Browser in OS X

Guide to Hardening Your Firefox Browser in OS X

May 22, 2013

Our Firefox Hardening Guide for OS X has some tips to help you stay more secure as you browse the web. Updates coming soon!

By Carl Livitt

Technical Research

SSL Key Generation Weaknesses

SSL Key Generation Weaknesses

Mar 8, 2012

SSL key generation weaknesses can be avoided (or at least mitigated) - and Carl Livitt from Bishop Fox shows you how in this write-up.

By Carl Livitt

Advisory

Oracle WebLogic Node Manager allows arbitrary configuration via UNC path

Oracle WebLogic Node Manager allows arbitrary configuration via UNC path

Oct 12, 2010

Oracle WebLogic Node Manager 10.3.3 and earlier versions contain a remote file inclusion vulnerability that could allow a remote attacker to execute arbitrary commands on an affected system.

By Carl Livitt

Advisory

PGP Desktop Wipe Free Space Flaw

PGP Desktop Wipe Free Space Flaw

Dec 8, 2005

This Bishop Fox security advisory details a vulnerability Vincent Liu found in PGP Desktop. The vulnerability was presented at Black Hat 2005.

By Vincent Liu

Advisory

Windows File Time Stamp Display Flaw

Windows File Time Stamp Display Flaw

Dec 7, 2005

This security advisory details a vulnerability Vincent Liu identified in 2005.

By Vincent Liu

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.