Understand how Threat Led Penetration Testing (TLPT) establishes a foundation for DORA compliance Watch the video›

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

District Con 2025 Decryption Firmware with Sonicrack video logo with play button.
Video

Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption

Researchers walk through cracking SonicOSX: extracting keys, decrypting firmware, and analyzing its architecture at DistrictCon 2025.

Preview of the managed penetration testing services datasheet.
Datasheet

Managed Penetration Testing Service Datasheet

Learn how to minimize the complexity and maximize the effectiveness of large security testing initiatives with our comprehensive program management.

Tile video cve 2025 24813
Video

Tomcat CVE-2025-24813: What You Need to Know

A breakdown of CVE-2025-24813 in Apache Tomcat—what it is, who’s actually at risk, and why most users likely aren’t affected. Keep calm and patch your servers.

Illustration fox speaking at podium to audience.
Webcast

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Join Alethe Denis, Senior Security Consultant, for an engaging deep dive into the world of Red Teaming. Through real-life stories and expert analysis, this webcast will explore the triumphs, missteps, and critical takeaways from Red Team engagements.

Cover page of the datasheet for the Cosmos integration with Jira.
Datasheet

Cosmos Integration for Jira Datasheet

Learn how to effortlessly sync validated exposures from the Cosmos portal into your Jira environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them.
2025 attack surface management (ASM) Fast mover recognition between best ASM vendors.
Report

2025 GigaOm Radar for Attack Surface Management

Get an overview of the Attack Surface Management (ASM) market — along with the key features and business criteria met by the top solutions — and learn why Bishop Fox was named a Fast Mover by the analysts at GigaOm.

Subscribe to our blog and advisories

Be first to learn about latest tools, advisories, and findings.

Video thumbnail with Jon Williams headshot and play button.
Video

SonicWall-CVE2024-53704: Exploit Details

Watch a quick explainer of Bishop Fox's successful exploit of SonicWall CVE-2024-53704.

Video Alethe Denis WWHF 2024
Video

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Senior Security Consultant Alethe Denis takes audiences on a riveting journey into the realm of Red Teaming through captivating narratives and insightful analysis.

2025 Q1 Video RVA Sec2024 Patch Perfect
Video

RVAsec 2024 - Patch Perfect: Harmonizing with LLMs to Find Security Vulns

This talk led by Bishop Fox researchers Caleb Gross & Josh Shomo cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products.

Cosmos video demo tile
Video

Cosmos Explained: The People and the Platform Empowering Security Teams

See how Cosmos combines attack surface technology and expert testing in a fully managed service to strengthen your security posture while reducing the burden on your teams.

Tech brief 1 Tile Featured Card
Webcast

Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption

Exclusive Bishop Fox client briefing: Insights into PAN-OS vulnerability (CVE-2024-0012) with Q&A and advanced threat detection strategies.

Adversarial Controls Testing Datasheet preview with purple background.
Datasheet

Adversarial Controls Testing Datasheet

Learn how Adversarial Controls Testing uses an attack-based approach mapped to the MITRE ATT&CK framework to determine the effectiveness of your email/phishing, endpoint, and network security controls.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.