Feb 05, 2025
From Dial Tone to Throne: IVR Testing in the Spirit of The King of NYNEX
By Alethe Denis
Jan 30, 2025
Hacking the Norm: Unique Career Journeys into Cybersecurity
By Gerben Kleijn, Nathan Elendt, Katie Ritchie
Jan 10, 2025
Navigating Workplace Security: Red Team Insights for the Return to Office
By Alethe Denis
Dec 12, 2024
Our Favorite Pen Testing Tools: 2024 Edition
By Bishop Fox
Oct 15, 2024
Off the Fox Den Bookshelf: Security and Tech Books We Love
By Bishop Fox
Sep 17, 2024
Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing
By Bishop Fox
Subscribe to our blog and advisories
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Aug 28, 2024
Offensive Security Under the EU Digital Operational Resilience Act (DORA)
By Harley Geiger
Aug 13, 2024
Manipulating the Mind: The Strategy and Practice of Social Engineering
By Alethe Denis
Aug 01, 2024
Adversarial Controls Testing: A Step to Cybersecurity Resilience
By Bishop Fox
Jul 17, 2024
Leveraging Offensive Security for Effective Post-Attack Recovery
By Bishop Fox
Jun 14, 2024
How Does Social Engineering Work? From Planning to Execution
By Bishop Fox
May 29, 2024
Strengthen Security to Mitigate Third-Party Risks
By Matt Twells
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.