Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
Ham Hacks: Breaking into the world of software-defined radio
DerpCon 2020 presentation explores how to find, capture, and reverse-engineer RF signals.
Demystifying Capture the Flags (CTFs)
DerpCon 2020 presentation on CTF formats, the skills they require, and the experience they develop.
Salesflare Focuses on Application Security for the G Suite Marketplace
Scaling up Google's Third-Party Security Program
Expose Yourself Without Insecurity: Cloud Breach Patterns
Presentation from BSides Atlanta 2020 explores the unprecedented level of exposures in the Cloud and how they can be found.
Attacking the Data Before the Decision
Presentation from BSides Tampa 2020 explores the vulnerabilities of machine learning systems and how to mitigate them.
How to Write Like It's Your Job
Presentation from BSides San Francisco 2020 offers practical advice for security writers.
Sonos Makes Secure Moves with Bishop Fox
Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.
Zigbee Hacking: Smarter Home Invasion with ZigDiggity
Finding Secrets In Publicly Exposed EBS Volumes
ZigDiggity: ZigBee Hacking Toolkit
Presentation from Black Hat USA 2019 reveals an open-source pentest arsenal for Zigbee networks.
Ghost In The Browser - Broad-Scale Espionage With Bitsquatting
Presentation from Kapersky SAS 2019 on an unfortunate side effect to achieving HTTPS everywhere and learn what can be done to mitigate the risk.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.