AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Podcast

Malvertising, Trusted Tools, Real-Time Attacks & Shrinking Windows

In this Initial Access podcast episode, we examine how attackers are turning normal workflows and trusted systems into reliable paths for initial access as exploitation timelines continue to shrink.

Guide

Secure AI-Assisted Development: 15 Guardrails for Shipping AI-Generated Code

Before releasing AI-developed software, use our recommended security guardrails checklist to learn how to constrain generated code, enforce security controls, and prevent silent risk from prompt to production.

Dark workshop series graphic reading “Inside Cirro” with sessions on mapping attack paths in Azure and extensible identity graphs.
Workshops & Training

Workshop Series: Inside Cirro

Get a practical look at Cirro with creator Leron Gray, a new open-source tool for modeling Azure and Entra ID environments as relationship graphs to make privilege and attack paths easier to understand.

Dark graphic labeled “Virtual Session” with text “Tactics of Deception: Protecting Trust and Purpose” over abstract computer imagery.
Virtual Session

Tactics of Deception: Protecting Trust and Purpose

Trained people, strong controls, still getting fooled? This session breaks down how modern social engineering exploits trust and urgency, and what actually works to stop it.

Podcast

Speed, Trust, and the Compromised Workbench

In this Initial Access podcast episode, we explore how attackers are collapsing timelines and exploiting trust relationships, turning developer environments into the fastest path to full compromise, and where defenders still have room to slow them down.

Bishop Fox “Initial Access” graphic dated March 13, 2026, featuring cybersecurity news and threat intelligence updates.
Podcast

Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks

In this Initial Access podcast episode, we examine how attackers are gaining initial access through social engineering, identity abuse, and vulnerable edge infrastructure.

Subscribe to our blog

Be first to learn about latest tools, advisories, and findings.

Customer Story

Designing for Resilience: LastPass Prioritizes Security in Move to Cloud

Rebuilding in AWS gave LastPass a clean slate, but it also meant getting the architecture right. To be sure their security boundaries would hold, they partnered with Bishop Fox to test their cloud environment under realistic conditions and strengthen it where it mattered most.

Bishop Fox “Initial Access” graphic dated March 6, 2026, featuring cybersecurity news and threat intelligence updates.
Podcast

AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks

In this Initial Access podcast episode, we cover AI coding agents operating inside developer environments, automated attack platforms accelerating exploitation cycles, long-lived connected devices exposing unexpected telemetry risks, and why identity systems remain the primary entry point for attackers.

Customer story graphic titled "Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure" with Bishop Fox branding on a dark background with teal and red data visualization accents.
Customer Story

Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure

A major airline technology platform turned to Bishop Fox after routine assessments kept missing the mark. What followed revealed unauthorized PCI database access, misconfigured IAM roles spanning hundreds of instances, and lateral movement across Active Directory domains — driving immediate remediation and stronger customer trust.

Bishop Fox “Initial Access” graphic dated February 27, 2026, featuring cybersecurity news and threat intelligence updates.
Podcast

Autonomous AI, Broken Guardrails, and Geopolitics

In this Initial Access podcast episode, we cover autonomous vulnerability discovery, AI agents that ignore instructions, and why models are becoming strategic national assets.

GigaOm Radar Report 2026 Attack Surface Management with security risk radar graphic and Bishop Fox branding.
Report

2026 GigaOm Radar for Attack Surface Management

Get an overview of the 2026 Attack Surface Management (ASM) market — along with the key features and business criteria met by the top solutions — and learn why Bishop Fox was named Leader and Fast Mover by the analysts at GigaOm.

Virtual session banner titled “The Role of AI in Modernizing Enterprise Application Security” with dark cybersecurity-themed background and bold typography.
Virtual Session

The Role of AI in Modernizing Enterprise Application Security

Modern enterprise apps are sprawling, fast moving, and AI accelerated, yet traditional testing cannot keep up. Watch this session to learn how AI assisted, expert led testing expands security coverage at scale, improves consistency, and strengthens protection across complex enterprise application portfolios.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.