| | Raink: Use LLMs for Document Ranking (bishopfox.com) |
|
4 points by rahimnathwani 12 days ago | past | discuss
|
| | Raink: Use LLMs for Document Ranking (bishopfox.com) |
|
1 point by noperator 54 days ago | past
|
| | Show HN: Broken Hill: A Productionized GCG Attack Tool for Use Against LLMs (bishopfox.com) |
|
4 points by blincoln 5 months ago | past | 1 comment
|
| | An exploration of JSON interoperability vulnerabilities (bishopfox.com) |
|
2 points by fanf2 6 months ago | past
|
| | Don't use pixelation for redacting text (2022) (bishopfox.com) |
|
62 points by bookofjoe 9 months ago | past | 51 comments
|
| | GWT: Unpatched, Unauthenticated Java Deserialization (bishopfox.com) |
|
1 point by blincoln on Dec 18, 2023 | past
|
| | Bad Pods: Kubernetes Pod Privilege Escalation (2021) (bishopfox.com) |
|
1 point by sneakerblack on Dec 1, 2023 | past
|
| | h2c Smuggling: Request Smuggling via HTTP/2 Cleartext (h2c) (bishopfox.com) |
|
3 points by pabs3 on March 4, 2022 | past
|
| | Don't use text pixelation to redact sensitive information (bishopfox.com) |
|
485 points by feross on Feb 15, 2022 | past | 163 comments
|
| | An Exploration of JSON Interoperability Vulnerabilities (bishopfox.com) |
|
2 points by spacebanana7 on Feb 11, 2022 | past
|
| | XMPP: An Under-Appreciated Attack Surface (bishopfox.com) |
|
25 points by zaik on Jan 8, 2022 | past | 3 comments
|
| | An Intro to Fuzzing (a.k.a. Fuzz Testing) (bishopfox.com) |
|
4 points by historynops on Oct 25, 2021 | past
|
| | IAM Vulnerable – An AWS IAM Privilege Escalation Playground (bishopfox.com) |
|
1 point by thinkmassive on Sept 10, 2021 | past
|
| | You're Doing IoT RNG (bishopfox.com) |
|
3 points by gregmac on Aug 9, 2021 | past | 1 comment
|
| | Lexss: Bypassing Lexical Parsing Security Controls (bishopfox.com) |
|
16 points by todsacerdoti on June 25, 2021 | past | 2 comments
|
| | Bad Pods: Kubernetes Pod Privilege Escalation (bishopfox.com) |
|
2 points by lateoctober on April 20, 2021 | past
|
| | An Exploration of JSON Interoperability Vulnerabilities (bishopfox.com) |
|
46 points by theBumbleSec on Feb 26, 2021 | past | 14 comments
|
| | Lessons Learned on Brute-Forcing RMI-IIOP with RMIScout (bishopfox.com) |
|
1 point by bishop_fox on Dec 8, 2020 | past
|
| | OpenClinic Version 0.8.2 – security advisory (bishopfox.com) |
|
1 point by bishop_fox on Dec 1, 2020 | past
|
| | The Pen Testing Tools We’re Thankful for in 2020 (bishopfox.com) |
|
3 points by bishop_fox on Nov 23, 2020 | past
|
| | Diverse Perspectives Offer a Broader Understanding of Your Attack Surface (bishopfox.com) |
|
1 point by bishop_fox on Nov 17, 2020 | past
|
| | Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 3) (bishopfox.com) |
|
1 point by bishop_fox on Nov 10, 2020 | past
|
| | Immuta Version 2.8.2 – Security Advisory (bishopfox.com) |
|
1 point by bishop_fox on Nov 4, 2020 | past
|
| | Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 2) (bishopfox.com) |
|
2 points by bishop_fox on Nov 2, 2020 | past
|
| | Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 1) (bishopfox.com) |
|
1 point by bishop_fox on Oct 29, 2020 | past
|
| | Winston Privacy Version 1.5.4 Disclosure (bishopfox.com) |
|
1 point by bishop_fox on Oct 27, 2020 | past
|
| | Accidentally Secure Is Not Secure: A Case of Three Stooges Syndrome (bishopfox.com) |
|
2 points by bishop_fox on Oct 20, 2020 | past
|
| | How to Keep Your Organization Safe from Social Engineering (bishopfox.com) |
|
2 points by bishop_fox on Oct 13, 2020 | past
|
| | Defining the Scope of Your Pen Test (bishopfox.com) |
|
1 point by bishop_fox on Oct 6, 2020 | past
|
| | The True Impact of Human Expertise on Your Perimeter (bishopfox.com) |
|
1 point by bishop_fox on Sept 30, 2020 | past
|
|
|
More |