<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>A leading provider of #offensivesecurity solutions &amp; contributor to the #infosec community. #pentesting #hacking</description><link>https://bsky.app/profile/bishopfox.bsky.social</link><title>@bishopfox.bsky.social - Bishop Fox</title><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mj65z5jhv22i</link><description>ICYMI: FortiClient EMS Auth Bypass (CVE-2026-35616)&#xA;&#xA;Unauthenticated attackers can bypass cert-based auth via header spoofing + weak validation.&#xA;&#xA;Exploitation confirmed in the wild.&#xA;&#xA;Patch now or upgrade to 7.4.7.&#xA;We also released a safe detection tool: https://bishopfox.com/blog/api-authentication-bypass-in-forticlient-ems-7-4-5-7-4-6-cve-2026-35616</description><pubDate>10 Apr 2026 20:29 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mj65z5jhv22i</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mj36znj4a227</link><description>The Axios supply chain attack is a reminder that trusted software can still introduce risk.&#xA;&#xA;Malicious package versions were distributed through normal install workflows, leading to remote access and potential compromise.</description><pubDate>09 Apr 2026 16:09 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mj36znj4a227</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3miyuwruz2k2c</link><description>🔴 LIVE NOW&#xA;&#xA;Social engineering isn’t just phishing anymore. It&#39;s evolved to deepfakes, voice cloning, and real-time impersonation.&#xA;&#xA;Join Senior Security Consultant II @alethe.bsky.social in Tactics of Deception: Protecting Trust and Purpose: https://bishopfox.com/resources/tactics-of-deception-protecting-trust-and-purpose</description><pubDate>08 Apr 2026 18:04 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3miyuwruz2k2c</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3miwnqdgakk2q</link><description>A fake Zoom call.&#xA;A quick “update.”&#xA;And the user does the rest.</description><pubDate>07 Apr 2026 20:49 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3miwnqdgakk2q</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mim2fdviwc2l</link><description>Part 1 gave the foundation. Part 2 goes deeper.&#xA;&#xA;Inside Cirro: Schemas and Extensible Identity Graphs&#xA;April 7 | 2 p.m. ET&#xA;&#xA;Leron Gray breaks down how Cirro approaches extensibility and identity risk at scale.&#xA;&#xA;Register: https://bishopfox.com/resources/workshop-series-cirro</description><pubDate>03 Apr 2026 15:37 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mim2fdviwc2l</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mierfhldgc26</link><description>🔴 Happening now: Mapping Attack Paths in Azure&#xA;&#xA;We’re live with Part 1 of our Inside Cirro workshop.&#xA;&#xA;If you’re looking to better understand how identity, roles, and resources connect and how attack paths actually form in Azure join us now.&#xA;&#xA;You can still jump in: https://bishopfox.com/resources/workshop-series-cirro</description><pubDate>31 Mar 2026 18:07 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mierfhldgc26</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3micgqdqpnc27</link><description>Happening Tomorrow: Mapping Attack Paths in Azure&#xA;&#xA;In Part 1 of our Inside Cirro workshop series, Leron Gray walks through how graph-based modeling helps uncover:&#xA;&#xA;• Attack paths&#xA;• Privilege propagation&#xA;• Identity-driven risk in Azure and Entra ID</description><pubDate>30 Mar 2026 19:51 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3micgqdqpnc27</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mhyh7z3pck2b</link><description>We’re launching a new open-source tool, Cirro, along with a two-part workshop series on how it works!&#xA;&#xA;The sessions cover mapping attack paths in Azure and modeling identity relationships to better understand risk.&#xA;&#xA;March 31 &amp; April 7 | 2 p.m. ET</description><pubDate>26 Mar 2026 20:33 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mhyh7z3pck2b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mhyecteqyc2b</link><description>🚨 New research from Bishop Fox: CVE-2026-25075&#xA;&#xA;An integer underflow in strongSwan’s EAP-TTLS parser allows unauthenticated attackers to crash VPN services.&#xA;&#xA;The vulnerability affects versions going back over 15 years.&#xA;&#xA;Upgrade to 6.0.5 or disable EAP-TTLS.</description><pubDate>26 Mar 2026 19:41 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mhyecteqyc2b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mht6j3qsd22j</link><description>🔴 Now Live&#xA;&#xA;The Role of AI in Modernizing Enterprise Application Security&#xA;&#xA;How do you scale security testing across complex enterprise environments?&#xA;&#xA;Join Zach Moreno as he breaks down how AI is helping teams expand coverage without sacrificing depth.&#xA;&#xA;https://bishopfox.com/resources/the-role-of-ai-in-modernizing-enterprise-application-security</description><pubDate>24 Mar 2026 18:14 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mht6j3qsd22j</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mhgszibnu22z</link><description>“If I found an iOS exploit… I might just sell it and retire.”&#xA;&#xA;iOS exploits are rare, expensive, and usually not something you just stumble across.&#xA;&#xA;Leron Gray &amp; Thomas Wilson on:&#xA;• why iOS is harder to exploit&#xA;• who typically has access&#xA;• the tradeoff between security &amp; openness</description><pubDate>19 Mar 2026 20:16 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mhgszibnu22z</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mh22j5fie223</link><description>Some puzzles take time.&#xA;&#xA;Happy Pi Day from Bishop Fox 🥧</description><pubDate>14 Mar 2026 18:26 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mh22j5fie223</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgskoidk4c26</link><description>Bishop Fox will be well represented at #HackGDL this week!&#xA;&#xA;Our team is presenting research and workshops on cloud security, hardware hacking, application security, reverse engineering, and career growth in cybersecurity.&#xA;&#xA;https://bishopfox.com/events/bishop-fox-at-hackgdl-2026</description><pubDate>11 Mar 2026 18:54 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgskoidk4c26</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgpvmyfq4k2a</link><description>AI agents inside developer environments introduce a new trust question:&#xA;&#xA;How much autonomy should they actually have?&#xA;&#xA;In this clip, Shad Malloy explains why applying least autonomy to agents may be the safest approach, essentially extending the idea of least privilege to AI systems.</description><pubDate>10 Mar 2026 17:32 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgpvmyfq4k2a</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgg5mpgzfk24</link><description>Introducing CloudFox GCP&#xA;&#xA;A new extension of CloudFox designed to help practitioners assess Google Cloud environments from an attacker’s perspective.&#xA;&#xA;Now on GitHub: https://bishopfox.com/blog/introducing-cloudfox-gcp-attack-path-identification-for-google-cloud</description><pubDate>06 Mar 2026 20:28 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgg5mpgzfk24</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mgdh6izfac2d</link><description>Enterprise application portfolios are bigger and more complex than ever.&#xA;&#xA;But most testing models were built for a much smaller world.&#xA;&#xA;Join our session with Zach Moreno on how AI-assisted testing can help security teams scale coverage across modern enterprise environments.&#xA;&#xA;March 24 | 2 p.m. ET</description><pubDate>05 Mar 2026 18:41 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mgdh6izfac2d</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mganf5lv3c26</link><description>Most underrated engineering principle?&#xA;&#xA;YAGNI.&#xA;&#xA;If you’re building for a future that doesn’t exist yet, you’re adding complexity.&#xA;&#xA;From our recent tool building workshop on Discord.</description><pubDate>04 Mar 2026 15:54 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mganf5lv3c26</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mfrioz6rrc2r</link><description>Smart TVs are part of your attack surface.&#xA;&#xA;We identified an arbitrary command injection issue in Samsung Tizen OS (through 9.0) that allows OS-level command execution in developer mode.&#xA;&#xA;Details: https://bishopfox.com/blog/samsung-tizen-os-version-through-9-0</description><pubDate>26 Feb 2026 15:20 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mfrioz6rrc2r</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mfmwd2rr422u</link><description>AI risk doesn’t behave like traditional software risk in that:&#xA;&#xA;It’s probabilistic.&#xA;It’s supply-chain dependent.&#xA;It’s difficult to fully enumerate.&#xA;&#xA;In this clip from our AI &amp; Security Risks panel, @kriskimmerle.bsky.social of RealPage, Inc. breaks down why governance needs a different framing.</description><pubDate>24 Feb 2026 19:41 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mfmwd2rr422u</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mfknrt4f7s2x</link><description>Bot traffic spikes on a ghost website.&#xA;&#xA;It&#39;s a weird headline.&#xA;&#xA;But the real defender question is:&#xA;When you see activity in one area, is that the target or the distraction?&#xA;&#xA;From the latest Initial Access with Dan Petro and Justin Greis of acceligence.</description><pubDate>23 Feb 2026 22:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mfknrt4f7s2x</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mfakycbag225</link><description>Christie Terrill (CISO, Bishop Fox) will speak at the Official Cybersecurity Summit on how diversity strengthens cybersecurity teams, improving innovation, threat detection, and long-term resilience.&#xA;&#xA;Complimentary registration with code CSS26-FAIR.&#xA;Up to 8 CPE credits.&#xA;&#xA;Feb. 25 | New York</description><pubDate>19 Feb 2026 21:46 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mfakycbag225</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mf3dh2jnjc22</link><description>Good step for RCS security!&#xA;&#xA;We&#39;ve got a ways to go still, but this is progress.&#xA;&#xA;[contains quote post or other embedded content]</description><pubDate>17 Feb 2026 19:48 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mf3dh2jnjc22</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mf325ioy3s2b</link><description>If you’ve ever wondered why AppSec coverage never seems to catch up with reality, this is a good read.&#xA;&#xA;At its core, it&#39;s an operating model problem. This post by Principal Technology Strategist Rob Ragan walks through why most apps never get tested and what actually changes that.</description><pubDate>17 Feb 2026 17:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mf325ioy3s2b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3meyx6mzqck2b</link><description>AI-powered impersonation into&#xA;Live Zoom calls into&#xA;ClickFix malware.&#xA;&#xA;Senior Security Consultant Brandon Kovacs explains how deepfake tech is now being used to gain real initial access into enterprise environments.</description><pubDate>16 Feb 2026 21:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3meyx6mzqck2b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3meyqa2qhp22b</link><description>Trusted marketplace integrations can still be attack paths.&#xA;&#xA;Senior Security Consultant Leron Gray explains why if you’re not reviewing your Azure enterprise apps and Outlook add-ins regularly, you probably should be.</description><pubDate>16 Feb 2026 18:58 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3meyqa2qhp22b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3meu2cav2hc2b</link><description>Social engineering our way into your heart. 🤍🩶🖤❤️ Just kidding. We’d rather earn your trust the right way.&#xA;&#xA;Happy Valentine’s Day from Bishop Fox.</description><pubDate>14 Feb 2026 22:15 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3meu2cav2hc2b</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3meotrntvxs2w</link><description>The security ecosystem is packed with tools.&#xA;&#xA;But sometimes the right move is to sit down and build exactly what you need.&#xA;&#xA;Tom Hudson (@tomnomnom.com ) is hosting a live Discord workshop on when to build, when not to, and how to approach tool-building without overengineering.</description><pubDate>12 Feb 2026 20:35 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3meotrntvxs2w</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3meosl2de2c2d</link><description>Be honest:&#xA;&#xA;When you picked your last Red Team vendor, what mattered most?</description><pubDate>12 Feb 2026 20:14 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3meosl2de2c2d</guid></item><item><link>https://bsky.app/profile/bishopfox.bsky.social/post/3mem6ojzp6223</link><description>Happening now &#xA;&#xA;AI &amp; Security Risks: A Cyber Leadership Panel&#xA;&#xA;Real talk from security and AI leaders on where AI risk is showing up right now and what teams are doing about it.&#xA;&#xA;https://bishopfox.com/resources/ai-security-risks-a-cyber-leadership-panel</description><pubDate>11 Feb 2026 19:12 +0000</pubDate><guid isPermaLink="false">at://did:plc:bmd7dwf5akrptlhxnirxttyp/app.bsky.feed.post/3mem6ojzp6223</guid></item></channel></rss>