Bishop Fox Blog / Topic - Network Security

You’ve Already Heard of testssl.sh; Now, Meet IDontSpeakSSL. What is it? It’s a simple script designed for parsing testssl.sh results. It was created to automate the discovery of bad practices …

Read Story

Over the past year, I came across two server-side attack vectors based on CSV injection (explained well here). The first case shows an instance of data exfiltration via Google Sheets …

Read Story

If you've been following our actions on social media lately, you'll notice we did a "12 Days of Security" series of cybersecurity tips for how to stay secure around the …

Read Story

NOTE: There is no conflict of interest in the following content. The products in this VPN guide were chosen strictly as a result of research. We received no compensation from …

Read Story

This blog post was authored by Senior Security Analyst Zach Julian; you can connect with him on Twitter here. In the first week of 2017, Iranian ISP Telecommunication Infrastructure Company …

Read Story

For a more detailed technical look at network segmentation, read this guide by Cory Johnson. After re-watching the original film in preparation for seeing the upcoming Star Wars: Rogue One, …

Read Story

You may be interested in exploring the possibilities of network segmentation, but may not be sure what that looks like for your home network or the network of your small …

Read Story

Subscribe by Email