Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption
Exclusive Bishop Fox client briefing: Insights into PAN-OS vulnerability (CVE-2024-0012) with Q&A and advanced threat detection strategies.
Adversarial Controls Testing Datasheet
Learn how Adversarial Controls Testing uses an attack-based approach mapped to the MITRE ATT&CK framework to determine the effectiveness of your email/phishing, endpoint, and network security controls.
Physical Penetration Testing Datasheet
Learn how our customized Red Team assessments identify security gaps in your physical, process, and human controls so you can fortify your defenses.
Achieving DORA Threat-Led Penetration Testing Requirements
Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.
Cosmos for ServiceNow Datasheet
| Learn how to effortlessly sync validated exposures from the Cosmos portal into your ServiceNow environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them. |
Cosmos Integration with Jira Demo
Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for Jira®.
Cosmos Integration with ServiceNow® Demo
Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for ServiceNow.
FAQ Guide: Acquiring DORA Threat-Led Penetration Testing
Bishop Fox’s comprehensive DORA FAQ guide walks you through everything you need to know about fulfilling these critical requirements. This resource is a must-have for financial institutions looking to stay ahead of DORA’s complex compliance landscape.
Red vs Blue: Building a Well-Rounded Cybersecurity Career Path
Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.
Cyber Mirage: How AI is Shaping the Future of Social Engineering
In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.
Bishop Fox Application Penetration Testing Packages Methodology
Download Bishop Fox's app pen testing packages methodology. Learn our Baseline, Standard, and Advanced approaches to scaling security testing coverage.
Bishop Fox Adversarial Controls Testing Methodology
Get detailed insights into how Bishop Fox conducts Adversarial Controls Testing (ACT) engagements. This comprehensive methodology document outlines the step-by-step process, collaboration model, example test cases, and delineation of responsibilities critical to validating your security controls.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.