Hacker News new | past | comments | ask | show | jobs | submit | from login
Raink: Use LLMs for Document Ranking (bishopfox.com)
4 points by rahimnathwani 12 days ago | past | discuss
Raink: Use LLMs for Document Ranking (bishopfox.com)
1 point by noperator 54 days ago | past
Show HN: Broken Hill: A Productionized GCG Attack Tool for Use Against LLMs (bishopfox.com)
4 points by blincoln 5 months ago | past | 1 comment
An exploration of JSON interoperability vulnerabilities (bishopfox.com)
2 points by fanf2 6 months ago | past
Don't use pixelation for redacting text (2022) (bishopfox.com)
62 points by bookofjoe 9 months ago | past | 51 comments
GWT: Unpatched, Unauthenticated Java Deserialization (bishopfox.com)
1 point by blincoln on Dec 18, 2023 | past
Bad Pods: Kubernetes Pod Privilege Escalation (2021) (bishopfox.com)
1 point by sneakerblack on Dec 1, 2023 | past
h2c Smuggling: Request Smuggling via HTTP/2 Cleartext (h2c) (bishopfox.com)
3 points by pabs3 on March 4, 2022 | past
Don't use text pixelation to redact sensitive information (bishopfox.com)
485 points by feross on Feb 15, 2022 | past | 163 comments
An Exploration of JSON Interoperability Vulnerabilities (bishopfox.com)
2 points by spacebanana7 on Feb 11, 2022 | past
XMPP: An Under-Appreciated Attack Surface (bishopfox.com)
25 points by zaik on Jan 8, 2022 | past | 3 comments
An Intro to Fuzzing (a.k.a. Fuzz Testing) (bishopfox.com)
4 points by historynops on Oct 25, 2021 | past
IAM Vulnerable – An AWS IAM Privilege Escalation Playground (bishopfox.com)
1 point by thinkmassive on Sept 10, 2021 | past
You're Doing IoT RNG (bishopfox.com)
3 points by gregmac on Aug 9, 2021 | past | 1 comment
Lexss: Bypassing Lexical Parsing Security Controls (bishopfox.com)
16 points by todsacerdoti on June 25, 2021 | past | 2 comments
Bad Pods: Kubernetes Pod Privilege Escalation (bishopfox.com)
2 points by lateoctober on April 20, 2021 | past
An Exploration of JSON Interoperability Vulnerabilities (bishopfox.com)
46 points by theBumbleSec on Feb 26, 2021 | past | 14 comments
Lessons Learned on Brute-Forcing RMI-IIOP with RMIScout (bishopfox.com)
1 point by bishop_fox on Dec 8, 2020 | past
OpenClinic Version 0.8.2 – security advisory (bishopfox.com)
1 point by bishop_fox on Dec 1, 2020 | past
The Pen Testing Tools We’re Thankful for in 2020 (bishopfox.com)
3 points by bishop_fox on Nov 23, 2020 | past
Diverse Perspectives Offer a Broader Understanding of Your Attack Surface (bishopfox.com)
1 point by bishop_fox on Nov 17, 2020 | past
Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 3) (bishopfox.com)
1 point by bishop_fox on Nov 10, 2020 | past
Immuta Version 2.8.2 – Security Advisory (bishopfox.com)
1 point by bishop_fox on Nov 4, 2020 | past
Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 2) (bishopfox.com)
2 points by bishop_fox on Nov 2, 2020 | past
Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 1) (bishopfox.com)
1 point by bishop_fox on Oct 29, 2020 | past
Winston Privacy Version 1.5.4 Disclosure (bishopfox.com)
1 point by bishop_fox on Oct 27, 2020 | past
Accidentally Secure Is Not Secure: A Case of Three Stooges Syndrome (bishopfox.com)
2 points by bishop_fox on Oct 20, 2020 | past
How to Keep Your Organization Safe from Social Engineering (bishopfox.com)
2 points by bishop_fox on Oct 13, 2020 | past
Defining the Scope of Your Pen Test (bishopfox.com)
1 point by bishop_fox on Oct 6, 2020 | past
The True Impact of Human Expertise on Your Perimeter (bishopfox.com)
1 point by bishop_fox on Sept 30, 2020 | past

Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: