AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Technical Briefing

Security Consultant Jon Williams video thumbnail.
Technical Briefing

Past Event: 03/18/2025

Tomcat CVE-2025-24813: What You Need to Know

A breakdown of CVE-2025-24813 in Apache Tomcat—what it is, who’s actually at risk, and why most users likely aren’t affected. Keep calm and patch your servers.

Learn More
District Con event logo
Technical Briefing

Past Event: February 21-22, 2022

Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption

Researchers walk through cracking SonicOSX: extracting keys, decrypting firmware, and analyzing its architecture at DistrictCon 2025.

Learn More
Bishop Fox Video Card Sonic Wall CVE202453704
Technical Briefing

Past Event: February 11, 2025

SonicWall-CVE2024-53704: Exploit Details

Security researcher Jon Williams reveals how attackers can silently compromise enterprise networks by hijacking legitimate VPN sessions on vulnerable SonicWall firewalls—no credentials required. Despite patches being available since January 2025, thousands of devices remain exposed, creating significant risk for organizations that haven't prioritized updates.

Learn More
Trevin Edgeworth, Red Team Practice Director at Bishop Fox, presenting a News Insights segment titled ‘Does X Mark a Target?’ in a virtual video discussion.
Technical Briefing

Past Event: January 23, 2025

Does X Mark a Target? with Trevin Edgeworth, Director of Red Team

Red Team Practice Director Trevin Edgeworth reveals how attackers leverage periods of organizational flux—from mergers to technology migrations—to breach defenses. Learn how recent high-profile compromises demonstrate the security vulnerabilities that emerge during times of change.

Learn More
Technical Brief #1 title with polygon fox head.
Technical Briefing

Past Event: Thursday, December 12, 2024

Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption

Bishop Fox client briefing: Insights into PAN-OS vulnerability (CVE-2024-0012) with Q&A and advanced threat detection strategies.

Learn More
GigaOm Special Webcast on Attack Surface Management solution featuring analyst Chris Ray with headshot
Technical Briefing

Past Event: On-Demand Webcast

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!

Learn More
Tool Talk Episode 6: Debugging Ruby Exploits
Technical Briefing

Past Event: On-Demand Webcast

Tool Talks: Debugging Ruby Exploits

In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.

Learn More
Webcast title in Futuristic Neon lettering: Achieving Warp Speed to Continuous Penetration Testing: How to Calculate ROI for your Organization.
Technical Briefing

Past Event: On-Demand Webcast

Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business

Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation. 

Learn More
Bishop Fox combats ransomware with an offensive Security Roadmap represented by a compass.
Technical Briefing

Past Event: On-Demand Webcast

Combating Ransomware with an Offensive Roadmap

Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.

Learn More
Bishop Fox Webcast about the perils of low risk exposure: The Wolf in Sheep's Clothing
Technical Briefing

Past Event: On-Demand Webcast

The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous

In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Watch our webcast as we dive into real-world examples and how you can proactively address these innocuous exposures with a modernized approach.

Learn More
Log4j Critical Zero-day vulnerability Fireside Chat: Get security expert advice on today's biggest security threat.
Technical Briefing

Past Event: On-Demand Webcast

Log4j Vulnerability: A Fireside Chat

Join our panelists as they dive into the attacker’s perspective and how you can identify unusual activity and harden systems against further compromise.

Learn More
Bishop Fox on-demand webcast on Threat Modeling in DevSecOps presented by security experts Tom Eston and Chris Bush
Technical Briefing

Past Event: On-Demand Webcast

What Bad Could Happen? Managing Application Risk with Threat Modeling

What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.

Learn More
Bishop Fox Webcast Cracking the code with Secure Code Review hosted by Chris Bush
Technical Briefing

Past Event: On-Demand Webcast

Cracking the Code: Secure Code Review in DevSecOps

On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.

Learn More
Bishop Fox Webcast Outpacing Modern Attackers with Security Researchers Wes Hutcherson, Barrett Darnell, and Ori Zigindere
Technical Briefing

Past Event: On-Demand Webcast

Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing

On-demand webcast provides an in-depth look at using Continuous Attack Surface Testing (CAST) to identify and close attack windows before it’s too late.

Learn More
Bishop Fox DevSecOps Webcast hosted by Tom Eston, AVP of Consulting Services at Bishop Fox
Technical Briefing

Past Event: On-Demand Webcast

How to Build a DevSecOps Program that Works for Developers AND Security

Explore how the right DevSecOps strategy empowers both your security and development teams with Tom Eston, AVP of Consulting at Bishop Fox.

Learn More
Bishop Fox Fireside Chat with Charles Carmakal, Vinnie Liu and Alex Stamos on what we learned from the Solarwinds attack and supply chain security
Technical Briefing

Past Event: On-Demand Webcast

Fireside Chat: What We Learned from the SolarWinds Attack (and Beyond)

On-demand webcast features security experts discussing recent attacks at SolarWinds, Colonial Pipeline, and more.

Learn More
Headshot of Tom Eston introducing the webcast. DevSecOps and Application Penetration Testing: Defying the Myth.
Technical Briefing

Past Event: On-Demand Webcast

DevSecOps and Application Penetration Testing: Defying the Myth

Tom Eston, AVP of Consulting at Bishop Fox, dives into the role of application penetration testing in today’s software development lifecycle (SDLC).

Learn More

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.