AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Bishop Fox “Initial Access” graphic dated February 13, 2026, featuring cybersecurity news and threat intelligence updates.
Podcast

Initial Access: February 13, 2026

This episode covers prompt injection, a hijacked Outlook add-in, commoditized mobile spyware, AI executive deepfake scams, IT-to-OT pivoting, and nation-state use of commercial LLMs to accelerate exploitation.

Cybersecurity workshop graphic “Building Tools: What, When, and How” highlighting practical guidance on when and how to build security tools.
Workshops & Training

Building Tools: What, When, and How

Surrounded by security tools but still tempted to “just build it”? This hands-on workshop breaks down when custom tooling is worth it, when it’s not, and how to build fast, focused tools without overengineering.

Red Team Vendors Evaluation Matrix resource graphic by Bishop Fox featuring a red teaming vendor evaluation worksheet.
Guide

Red Team Vendor Evaluation Worksheet

The Red Team Vendor Evaluation Matrix Worksheet is designed to help security leaders evaluate red team vendors thoughtfully before engagement using a structured, question-driven approach.

Bishop Fox “Initial Access” graphic dated February 6, 2026, featuring cybersecurity news and threat intelligence updates.
Podcast

Initial Access: February 6, 2026

This episode covers the rollback of federal software security guidance, insider-driven access risks, ongoing state-sponsored espionage, and the security implications of giving AI tools deep control over infrastructure.

Service Portfolio APT solution brief Digital Tile
Solution Brief

Application Portfolio Penetration Testing Solution Brief

Download our solution brief. Learn how to secure entire application portfolios with attacker-realistic testing and expert-validated, trusted results.

Virtual session graphic titled “AI & Security Risks: A Cyber Leadership Panel,” focused on AI security risks and executive cybersecurity strategy.
Virtual Session

AI & Security Risks: A Cyber Leadership Panel

Watch a fireside chat with cybersecurity and AI leaders on today’s real AI security risks. Learn where risk is emerging, how leaders set ownership, the true cost of securing AI, and practical steps teams use to protect AI systems and data.

Subscribe to our blog

Be first to learn about latest tools, advisories, and findings.

Bishop Fox “Initial Access” graphic dated January 23, 2026, featuring cybersecurity news and threat intelligence updates.
Podcast

Initial Access: January 23, 2026

This episode covers AI prompt injection risks, continued social engineering via LinkedIn and QR codes, credential theft and session hijacking, patch reliability and appliance security, and how AI is being used to accelerate malware development—distinguishing meaningful risk from overhyped claims.

Virtual session graphic titled “Application Security: Getting More Out of Your Penetration Tests,” focused on improving application penetration testing value..
Virtual Session

Application Security: Getting More Out of Your Pen Tests

Application pen tests cost real time and money. Learn how to get real value from them. Bishop Fox lead researcher Dan Petro explains what good app tests include, how to evaluate AI-powered testing, and the questions that matter before and after an engagement.

image of teal guide cover with black text and white page on dark background
Guide

Fortifying Your Applications: A Guide to Penetration Testing

Download this guide to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.

Sliver Framework tool Workshop Part 3 Building Better Encoders workshop graphic with big head in background.
Workshops & Training

Sliver Workshop Part 3: Building Better Encoders

In our third Sliver workshop, we explore how Sliver handles traffic encoding by default and how attackers can extend its capabilities with custom Wasm-based encoders. We dive into Sliver’s encoder framework works, what’s possible with WebAssembly, and how to design and test your own encoders.

Virtual Session Red Team The Essential Tool for Security Leaders with black and white background and white and red text.
Virtual Session

Red Teaming: The Essential Tool for Security Leaders

Watch Trevin Edgeworth, Red Team Practice Director at Bishop Fox, in this virtual session where he will break down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions in the current AI landscape.

Virtual session banner titled “Peeling Back the Plastic: Finding 0-Days in IoT Devices” — cybersecurity webcast about discovering zero-day vulnerabilities in Internet of Things hardware.
Virtual Session

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Join Senior Security Consultant Nick Cerne for “Peeling Back the Plastic: Finding 0-Days in IoT Devices” on Tuesday, Nov. 18. Learn hands-on techniques for uncovering hidden vulnerabilities in consumer IoT devices and advancing your IoT security research skills.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.