Industry Blog

The foxes who work here come from a variety of backgrounds, giving them unique insights that advance our ability to emulate real-world attackers and secure our clients’ systems. In previous …

Read Story

It’s hard to be prepared for a crisis. How will you react? Will your plans work? Will your strategy succeed? One way to prepare for real security events is to …

Read Story

In early May 2020, US-CERT published an alert of the Top 10 vulnerabilities exploited by attackers from 2016 to 2019. The list reveals some patterns and attack methods preferred by …

Read Story

The COVID-19 news has many more office workers in the United States working remotely as we all adhere to the social distancing recommendations put forth to reduce the spread of …

Read Story

We recently covered the most up-to-date list of OWASP Top 10 vulnerabilities. In subsequent future posts, we’ll be discussing some of those more prominent vulnerabilities in a little more depth …

Read Story

In late 2019, a new critical-severity vulnerability began to threaten widely used Citrix appliances. While the security community explored the issue and businesses scrambled to learn if they were exposed, …

Read Story

At Bishop Fox, we regularly run product security reviews of our clients’ hardware, many of which require the use of specialized equipment. During a recent security assessment of a device …

Read Story

The Open Web Application Security Project, or OWASP, is a nonprofit that strives to educate the cybersecurity industry (its practitioners, researchers, and developers) about prominent web application bugs and the …

Read Story

For the past three years, the Bishop Fox engineering team has been tackling a number of emerging challenges in the offensive space and developing technology that amplifies their security capabilities …

Read Story

You May Also Like

Subscribe by Email