AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Abstract cybersecurity illustration featuring servers, network nodes, and stylized attack indicators representing penetration testing and threat activity.

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Advisory

ExpressionEngine, Version 7.3.15

ExpressionEngine, Version 7.3.15

Jun 17, 2024

Bishop Fox staff identified two vulnerabilities in Packet Tide’s ExpressionEngine version 7.3.15. The most severe issue allowed Bishop Fox staff to obtain access to a new administrator account in an instance of ExpressionEngine.

By Matthieu Keller

Industry

How Does Social Engineering Work? From Planning to Execution

How Does Social Engineering Work? From Planning to Execution

Jun 14, 2024

Discover the key points from our webcast, "How Does Social Engineering Work? in this recap blog.

By Bishop Fox Researchers

Technical Research

The Unmask IAM Permission: API Gateway Access Logging

The Unmask IAM Permission: API Gateway Access Logging

Jun 6, 2024

Unlock the secrets to securing your AWS environment! Learn the intricacies of IAM permissions and how to protect your Amazon API Gateway access logs.

By Chris Scrivana

Industry

Strengthen Security to Mitigate Third-Party Risks

Strengthen Security to Mitigate Third-Party Risks

May 29, 2024

Explore highlights from a recent webcast where special guest Anirban Banerjee, CEO and co-founder of partner Riscosity, and Matt Twells, senior solutions architect, explore critical considerations for developing a security program that prioritizes third-party risk reduction.

By Matt Twells

Advisory

OOB Memory Read: Netscaler ADC and Gateway

OOB Memory Read: Netscaler ADC and Gateway

May 6, 2024

The affected Citrix NetScaler components are used for Authentication, Authorization, and Auditing (AAA), and remote access. The latest version of NetScaler is 14.1-21.15, released on April 23, 2024.

By Bishop Fox Researchers

Culture

Which Star Wars Character Fits Your Cybersecurity Style?

Which Star Wars Character Fits Your Cybersecurity Style?

Apr 30, 2024

We’re asking the big question: Which Star Wars Characters Would Make Great Cybersecurity Professionals?

By Sean McMillan

Technical Research

PAN-OS CVE-2024-3400: Patch Your Palo Alto Firewalls

PAN-OS CVE-2024-3400: Patch Your Palo Alto Firewalls

Apr 19, 2024

Bishop Fox shares limited details about mitigation bypasses for PAN-OS CVE-2024-3400 in an effort to be maximally useful for defenders, while minimally useful for opportunistic attackers.

By Bishop Fox Researchers

Industry

Technology and Software: 2023 Insights From the Ponemon Institute

Technology and Software: 2023 Insights From the Ponemon Institute

Apr 2, 2024

Gain cutting edge insights into offensive security strategies used by the Technology & Software industry.

By Beth Robinson

Industry

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Apr 1, 2024

Gain insights into how enterprises can take a pragmatic and informed approach to AI and LLM technology adoption, ensuring reduced security risks.

By Bishop Fox Researchers

Technical Research

The iSOON Disclosure: Exploring the Integrated Operations Platform

The iSOON Disclosure: Exploring the Integrated Operations Platform

Mar 21, 2024

In this blog, examine the iSoon data disclosure from an offensive security perspective.

By Bishop Fox Researchers

Technical Research

Poisoned Pipeline Execution Attacks: A Look at CI-CD Environments

Poisoned Pipeline Execution Attacks: A Look at CI-CD Environments

Mar 19, 2024

In this blog, we examine three types of poisoned pipeline execution (PPE) attacks, methods to exploit these types of vulnerabilities, and recommended preventive measures.

By Sebastian Guerrero

Industry

Implementing the FDA's 2023 Requirements for Medical Device Cybersecurity

Implementing the FDA's 2023 Requirements for Medical Device Cybersecurity

Mar 12, 2024

Gain actionable tips to operationalize the FDA's 2023 legislation, H.R. 2617 Section 524B product security requirements for medical devices.

By Matt Twells

Technical Research

Further Adventures in Fortinet Decryption

Further Adventures in Fortinet Decryption

Mar 8, 2024

In this blog, we examine how the new Fortinet encryption scheme works and provide a tool to decrypt the root filesystem for x86-based FortiOS images.

By Bishop Fox Researchers

Technical Research

CVE-2024-21762 Vulnerability Scanner for FortiGate Firewalls

CVE-2024-21762 Vulnerability Scanner for FortiGate Firewalls

Mar 1, 2024

Discover vulnerable FortiGate firewalls with the Bishop Fox CVE-2024-21762 vulnerability scanner.

By Bishop Fox Researchers

Culture

Unlocking Job Opportunities with LinkedIn and Artificial Intelligence

Unlocking Job Opportunities with LinkedIn and Artificial Intelligence

Feb 28, 2024

Learn how to upgrade your job search in LinkedIn with helpful AI prompts and tips from an industry-leading recruiter.

By Kaitlin O'Neil

Culture

El Programa de Interns de Bishop Fox: Foxes de México Assemble!

El Programa de Interns de Bishop Fox: Foxes de México Assemble!

Feb 16, 2024

En Bishop Fox, siempre estamos buscando crear la próxima generación de Avengers de la seguridad ofensiva a través de nuestro innovador internship program.

By Lesley Mugford

Culture

The Bishop Fox Internship Program: Mexico Foxes Assemble!

The Bishop Fox Internship Program: Mexico Foxes Assemble!

Feb 15, 2024

Learn about our internship program for Mexico-based penetration testers.

By Lesley Mugford

Industry

Enabling Proper PCI Testing with External Penetration Tests

Enabling Proper PCI Testing with External Penetration Tests

Feb 14, 2024

Gain actionable insights on how to maximize external penetration testing to develop comprehensive PCI security strategies.

By Derek Rush

Culture

Must-Listen Top Cybersecurity Podcasts

Must-Listen Top Cybersecurity Podcasts

Feb 7, 2024

Interested in finding new ways to learn about the cybersecurity industry? Check this list of our must-listen top podcasts to hear from industry leading experts!

By Beth Robinson

Industry

Navigating Threats: Adopting Proactive Social Engineering and Network Testing Strategies

Navigating Threats: Adopting Proactive Social Engineering and Network Testing Strategies

Jan 16, 2024

Get insights from Bishop Fox experts on social engineering tactics, implementing technical controls, and the importance of internal network testing.

By Beth Robinson

Technical Research

It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Jan 15, 2024

Learn about SonicWall NGFW series 6 and 7 impacted by unauthenticated denial-of-service vulnerabilities with the potential for remote code execution.

By Jon Williams

Industry

Strengthening Cybersecurity Defenses: Validating Incident Response Plans with Red Team Tabletop Exercises

Strengthening Cybersecurity Defenses: Validating Incident Response Plans with Red Team Tabletop Exercises

Jan 4, 2024

In this blog, learn how Bishop Fox Red Team tabletop exercises help organizations test Incident Response plans against tactics, techniques, and procedures used by attackers.

By Alethe Denis

Technical Research

GWT: Unpatched, Unauthenticated Java Deserialization

GWT: Unpatched, Unauthenticated Java Deserialization

Dec 18, 2023

In this blog, learn about an eight year old unpatched and unauthenticated Java deserialization vulnerability in GWT.

By Ben Lincoln

Technical Research

Introducing Swagger Jacker: Auditing OpenAPI Definition Files

Introducing Swagger Jacker: Auditing OpenAPI Definition Files

Dec 12, 2023

Download Swagger Jacker, an open-source tool made for penetration testers that enables better auditing of OpenAPI definition files.

By Tony West

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.