<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>A leading provider of #offensivesecurity solutions &amp; contributor to the #infosec community. #pentesting #hacking</description><link>https://bsky.app/profile/bishopfox.bsky.social</link><title>@bishopfox.bsky.social - Bishop Fox</title><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mlvqfttmfc2r</link><description>Senior Operator I Tony West shares what it was actually like using frontier AI models to build Joro, a collaborative web exploitation framework for offensive security teams, including where the models accelerated development and where they completely broke things.</description><pubDate>15 May 2026 16:20 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mlvqfttmfc2r</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mlszvhlp5s2z</link><description>Happening today:&#xA;&#xA;Join AIMap creator Aashiq Ramachandran for a demo exploring how publicly exposed AI systems can be discovered, fingerprinted, scored, and tested in real time.&#xA;&#xA;We’ll walk through what attackers can see and what defenders should be paying attention to!</description><pubDate>14 May 2026 14:32 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mlszvhlp5s2z</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mlr7blovt22z</link><description>“What if consumers were never the real target?”&#xA;&#xA;On the latest Initial Access Sergio Villegas and John Untz discussed the recent Daemon Tools supply chain compromise and why average users may have simply been collateral damage.</description><pubDate>13 May 2026 21:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mlr7blovt22z</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mlbzqzkoy22w</link><description>How do you spot AI-generated code?&#xA;&#xA;Start with the comments—comments that explain every tiny thing in excruciating detail—whether you asked for it or not.&#xA;&#xA;Oh, and the em-dashes.&#xA;&#xA;Sr. Managing Operator Richard Brown explains.</description><pubDate>07 May 2026 20:14 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mlbzqzkoy22w</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3ml7c2cqe322b</link><description>Bishop Fox researchers reproduced CVE-2026-42208, a critical pre-authentication SQL injection in LiteLLM’s proxy.&#xA;&#xA;Exploitation was observed in the wild roughly 36 hours after disclosure.&#xA;&#xA;If you’re running LiteLLM, upgrade to 1.83.7+.</description><pubDate>06 May 2026 18:04 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3ml7c2cqe322b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3ml4yrncs6s2g</link><description>Stealth and flashy exploit chains are cool, but they don’t always translate to better outcomes for your org.&#xA;&#xA;Billy Giles is examining that tradeoff this weekend at Hack Space Con!</description><pubDate>05 May 2026 20:13 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3ml4yrncs6s2g</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mkzwit2awk2t</link><description>Stay on target...</description><pubDate>04 May 2026 14:55 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mkzwit2awk2t</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mksqtmvlqc2x</link><description>We turned a vulnerable AI support agent into a CTF.&#xA;&#xA;Welcome to MCP security.</description><pubDate>01 May 2026 18:25 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mksqtmvlqc2x</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mkarzo7bwc2r</link><description>Sr. Managing Operator Richard Brown breaks down NIST’s shift in CVE enrichment.&#xA;&#xA;Vulnerability volume is increasing, while enrichment is becoming more selective, often focused on government priorities.&#xA;&#xA;But that doesn’t align with every organization&#39;s risk.&#xA;&#xA;https://bishopfox.com/blog/understanding-the-cve-ecosystem-and-nists-changing-role</description><pubDate>24 Apr 2026 14:58 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mkarzo7bwc2r</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mjzsbfd77s2j</link><description>Claude Mythos Preview signals a shift in security:&#xA;&#xA;AI can now discover and chain vulnerabilities into real exploits with minimal human input.&#xA;&#xA;The gap between discovery and exploitation is shrinking and most teams aren’t built for that speed.</description><pubDate>21 Apr 2026 20:14 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mjzsbfd77s2j</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mjpg2kkgf22x</link><description>We’ll be at #SparkCon this weekend ⚡️&#xA;&#xA;Come talk real-world threats, meet the team, and grab some swag: https://bishopfox.com/events/meet-bishop-fox-at-sparkcon-2026</description><pubDate>17 Apr 2026 17:08 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mjpg2kkgf22x</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mjmurerwpc25</link><description>AI is supposed to “automate” security, but what does that actually mean?&#xA;&#xA;That&#39;s what we&#39;re exploring with a panel of AI security experts today at 2 p.m. ET&#xA;&#xA;Save a seat: https://bishopfox.com/resources/ai-security-in-the-age-of-project-glasswing-gpt-5-4-cyber</description><pubDate>16 Apr 2026 16:54 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mjmurerwpc25</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mji3aonvhk2i</link><description>Good security conversations shift to what teams do next.&#xA;&#xA;AVP of Consulting Zach Moreno on how evolving threats are changing priorities, especially around external attack surface and dependency risk.&#xA;&#xA;Full episode: https://bishopfox.com/resources/project-glasswing-ai-vulnerability-discovery-exploit</description><pubDate>14 Apr 2026 19:06 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mji3aonvhk2i</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mj65z5jhv22i</link><description>ICYMI: FortiClient EMS Auth Bypass (CVE-2026-35616)&#xA;&#xA;Unauthenticated attackers can bypass cert-based auth via header spoofing + weak validation.&#xA;&#xA;Exploitation confirmed in the wild.&#xA;&#xA;Patch now or upgrade to 7.4.7.&#xA;We also released a safe detection tool: https://bishopfox.com/blog/api-authentication-bypass-in-forticlient-ems-7-4-5-7-4-6-cve-2026-35616</description><pubDate>10 Apr 2026 20:29 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mj65z5jhv22i</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mj36znj4a227</link><description>The Axios supply chain attack is a reminder that trusted software can still introduce risk.&#xA;&#xA;Malicious package versions were distributed through normal install workflows, leading to remote access and potential compromise.</description><pubDate>09 Apr 2026 16:09 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mj36znj4a227</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3miyuwruz2k2c</link><description>🔴 LIVE NOW&#xA;&#xA;Social engineering isn’t just phishing anymore. It&#39;s evolved to deepfakes, voice cloning, and real-time impersonation.&#xA;&#xA;Join Senior Security Consultant II @alethe.bsky.social in Tactics of Deception: Protecting Trust and Purpose: https://bishopfox.com/resources/tactics-of-deception-protecting-trust-and-purpose</description><pubDate>08 Apr 2026 18:04 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3miyuwruz2k2c</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3miwnqdgakk2q</link><description>A fake Zoom call.&#xA;A quick “update.”&#xA;And the user does the rest.</description><pubDate>07 Apr 2026 20:49 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3miwnqdgakk2q</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mim2fdviwc2l</link><description>Part 1 gave the foundation. Part 2 goes deeper.&#xA;&#xA;Inside Cirro: Schemas and Extensible Identity Graphs&#xA;April 7 | 2 p.m. ET&#xA;&#xA;Leron Gray breaks down how Cirro approaches extensibility and identity risk at scale.&#xA;&#xA;Register: https://bishopfox.com/resources/workshop-series-cirro</description><pubDate>03 Apr 2026 15:37 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mim2fdviwc2l</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mierfhldgc26</link><description>🔴 Happening now: Mapping Attack Paths in Azure&#xA;&#xA;We’re live with Part 1 of our Inside Cirro workshop.&#xA;&#xA;If you’re looking to better understand how identity, roles, and resources connect and how attack paths actually form in Azure join us now.&#xA;&#xA;You can still jump in: https://bishopfox.com/resources/workshop-series-cirro</description><pubDate>31 Mar 2026 18:07 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mierfhldgc26</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3micgqdqpnc27</link><description>Happening Tomorrow: Mapping Attack Paths in Azure&#xA;&#xA;In Part 1 of our Inside Cirro workshop series, Leron Gray walks through how graph-based modeling helps uncover:&#xA;&#xA;• Attack paths&#xA;• Privilege propagation&#xA;• Identity-driven risk in Azure and Entra ID</description><pubDate>30 Mar 2026 19:51 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3micgqdqpnc27</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mhyh7z3pck2b</link><description>We’re launching a new open-source tool, Cirro, along with a two-part workshop series on how it works!&#xA;&#xA;The sessions cover mapping attack paths in Azure and modeling identity relationships to better understand risk.&#xA;&#xA;March 31 &amp; April 7 | 2 p.m. ET</description><pubDate>26 Mar 2026 20:33 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mhyh7z3pck2b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mhyecteqyc2b</link><description>🚨 New research from Bishop Fox: CVE-2026-25075&#xA;&#xA;An integer underflow in strongSwan’s EAP-TTLS parser allows unauthenticated attackers to crash VPN services.&#xA;&#xA;The vulnerability affects versions going back over 15 years.&#xA;&#xA;Upgrade to 6.0.5 or disable EAP-TTLS.</description><pubDate>26 Mar 2026 19:41 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mhyecteqyc2b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mht6j3qsd22j</link><description>🔴 Now Live&#xA;&#xA;The Role of AI in Modernizing Enterprise Application Security&#xA;&#xA;How do you scale security testing across complex enterprise environments?&#xA;&#xA;Join Zach Moreno as he breaks down how AI is helping teams expand coverage without sacrificing depth.&#xA;&#xA;https://bishopfox.com/resources/the-role-of-ai-in-modernizing-enterprise-application-security</description><pubDate>24 Mar 2026 18:14 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mht6j3qsd22j</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mhgszibnu22z</link><description>“If I found an iOS exploit… I might just sell it and retire.”&#xA;&#xA;iOS exploits are rare, expensive, and usually not something you just stumble across.&#xA;&#xA;Leron Gray &amp; Thomas Wilson on:&#xA;• why iOS is harder to exploit&#xA;• who typically has access&#xA;• the tradeoff between security &amp; openness</description><pubDate>19 Mar 2026 20:16 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mhgszibnu22z</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mh22j5fie223</link><description>Some puzzles take time.&#xA;&#xA;Happy Pi Day from Bishop Fox 🥧</description><pubDate>14 Mar 2026 18:26 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mh22j5fie223</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgskoidk4c26</link><description>Bishop Fox will be well represented at #HackGDL this week!&#xA;&#xA;Our team is presenting research and workshops on cloud security, hardware hacking, application security, reverse engineering, and career growth in cybersecurity.&#xA;&#xA;https://bishopfox.com/events/bishop-fox-at-hackgdl-2026</description><pubDate>11 Mar 2026 18:54 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgskoidk4c26</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgpvmyfq4k2a</link><description>AI agents inside developer environments introduce a new trust question:&#xA;&#xA;How much autonomy should they actually have?&#xA;&#xA;In this clip, Shad Malloy explains why applying least autonomy to agents may be the safest approach, essentially extending the idea of least privilege to AI systems.</description><pubDate>10 Mar 2026 17:32 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgpvmyfq4k2a</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgg5mpgzfk24</link><description>Introducing CloudFox GCP&#xA;&#xA;A new extension of CloudFox designed to help practitioners assess Google Cloud environments from an attacker’s perspective.&#xA;&#xA;Now on GitHub: https://bishopfox.com/blog/introducing-cloudfox-gcp-attack-path-identification-for-google-cloud</description><pubDate>06 Mar 2026 20:28 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgg5mpgzfk24</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgdh6izfac2d</link><description>Enterprise application portfolios are bigger and more complex than ever.&#xA;&#xA;But most testing models were built for a much smaller world.&#xA;&#xA;Join our session with Zach Moreno on how AI-assisted testing can help security teams scale coverage across modern enterprise environments.&#xA;&#xA;March 24 | 2 p.m. ET</description><pubDate>05 Mar 2026 18:41 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgdh6izfac2d</guid></item></channel></rss>