Our third and final installment in a series about cheating at video games. If you haven’t already read Part 1 and Part 2, go ahead and do that... continue reading
In our last segment, we talked about networking design and trust boundaries in video games and web applications. We pick back up with a story... continue reading
For as long as video games have existed, people have been competing to see who is the best. And wherever there is competition, someone will find a... continue reading
Most of the time, vulnerabilities are things that grant attackers superpowers: the ability to read or write arbitrary files to the server... continue reading
Application security is a complex topic that can be viewed through many lenses, and each is valuable when used in the right context. There’s one... continue reading
Introduction to OWASP Top 10 The Open Web Application Security Project, or OWASP, is a nonprofit that strives to educate the cybersecurity... continue reading
I completed an impossible hack the other day. A simple authorization bypass led me to a few hundred thousand fullz. I’m talking Social Security... continue reading
A few of us Bishop Fox consultants recently read through Google’s G Suite Developer’s guide, just to see what they advised. We came across a lot... continue reading
Companies that offer security products and services know they need to go above and beyond when it comes to ensuring their offerings are free from... continue reading
One of our researchers—Mike Brooks, also known as rook—found two high-risk vulnerabilities in the CA Single Sign-On (formerly CA SiteMinder®)... continue reading