Given my experience as a pen tester, bug bounty hunter, and now as a Continuous Attack Surface Testing (CAST) Operator, I’m always fascinated by... continue reading
Attackers don’t all approach a target in the same way. Often, they’ll target the lowest-hanging fruit or the easiest way to get through your... continue reading
With new CVEs and emerging threats making headlines daily, it’s easy to get distracted by less public risks that may be critical to your business.... continue reading
Last month, my friends and I hosted a Capture the Flag (CTF) tournament for the Red Team Village during DEF CON Safe Mode with Networking, and the... continue reading
If you've ever had the pleasure of reading Security, Accuracy, and Privacy in Computer Systems by futurist James Martin, the first thing you'll... continue reading
In late 2019, a new critical-severity vulnerability began to threaten widely used Citrix appliances. While the security community explored the... continue reading
For the past three years, the Bishop Fox engineering team has been tackling a number of emerging challenges in the offensive space and developing... continue reading
FIND OUT FIRST
Be the first to find out about latest tools, advisories, and findings.