Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.
Navigating Workplace Security: Red Team Insights for the Return to Office
Jan 10, 2025
By Alethe Denis
Cyber Mirage: How AI is Shaping the Future of Social Engineering
Jan 8, 2025
By Brandon Kovacs
Cosmos Series Part 3: The Importance of Automation
Jan 7, 2025
By Aaron Symanski
Cosmos Series Part 2: Outcome-driven for Features and Capabilities
Dec 31, 2024
By Aaron Symanski
Cosmos Series Part 1: Principles for the New Platform
Dec 17, 2024
By Aaron Symanski
Current State of SonicWall Exposure: Firmware Decryption Unlocks New Insights
Dec 13, 2024
By Bishop Fox Researchers
Our Favorite Pen Testing Tools: 2024 Edition
Dec 12, 2024
By Bishop Fox Researchers
Bishop Fox ASM Delivers 24-Hour Head Start Against Critical PAN-OS Vulnerability
Dec 9, 2024
By Caleb Gross
Sonicwall Firmware Deep Dive - SWI Firmware Decryption
Dec 2, 2024
By Bishop Fox Researchers
The Growing Concern of API Security
Nov 27, 2024
By Robert Punnett, Nicholas Beacham
Application Pen Testing: Point-In-Time vs Ongoing Approaches Explained
Nov 7, 2024
By Bishop Fox
A Brief Look at FortiJump (FortiManager CVE-2024-47575)
Nov 1, 2024
By Bishop Fox Researchers
Off the Fox Den Bookshelf: Security and Tech Books We Love
Oct 15, 2024
By Bishop Fox Researchers
Broken Hill: A Productionized Greedy Coordinate Gradient Attack Tool for Use Against Large Language Models
Sep 24, 2024
By Ben Lincoln
Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing
Sep 17, 2024
By Bishop Fox Researchers
Exploring Large Language Models: Local LLM CTF & Lab
Sep 11, 2024
By Derek Rush
Offensive Security Under the EU Digital Operational Resilience Act (DORA)
Aug 28, 2024
By Harley Geiger
Manipulating the Mind: The Strategy and Practice of Social Engineering
Aug 13, 2024
By Alethe Denis
Adversarial Controls Testing: A Step to Cybersecurity Resilience
Aug 1, 2024
By Bishop Fox Researchers
Leveraging Offensive Security for Effective Post-Attack Recovery
Jul 17, 2024
By Bishop Fox Researchers
Product Security Review Methodology for Traeger Grill Hack
Jul 2, 2024
By Nick Cerne
Traeger Grill D2 Wi-Fi Controller, Version 2.02.04
Jul 2, 2024
By Nick Cerne
ExpressionEngine, Version 7.3.15
Jun 17, 2024
By Matthieu Keller
How Does Social Engineering Work? From Planning to Execution
Jun 14, 2024
By Bishop Fox Researchers
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.