New from Ponemon Institute: The State of Offensive Security in 2023. Read the Report ›

Featured Webcast

Pacemakers to Pacesetters: A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.

Black background with purple and teal neon letters title: What the Vuln, EDR BYPAS W. LOLBINS.

What the Vuln: EDR Bypass with LoLBins

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Bishop Fox Livestream Zimbra Tile

What the Vuln: Zimbra

Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.

Tool Talk Episode 9 webcast title in neon letters on dark background with Matt Keeley and Joe Sechman headshots presenting the security tool Spoofy.

Tool Talk: Spoofy

Watch to explore Spoofy, a domain spoofing tool that checks whether a list of domains (in bulk) can be spoofed based on SPF and DMARC records.

Webcast on how emulation techniques provide safe testing scenarios to uncover ransomware susceptibility featuring the headshots of Bishop Fox and Illumio security experts, Trevin Edgeworth and Paul Dant.

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.

SANS and Bishop Fox webcast: Hacker Insights Revealed - Explore new ssurvey results with the cybersecurity experts.

Hacker Insights Revealed: Explore New SANS Survey Results

In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.

Bishop Fox Tool Talk Episode 8

Tool Talk:

Watch as we explore Bishop Fox’s very own, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.

Livestream Veterans Skillbridge Roundtable featuring Brad Alaska, Cosmos Intern, Bishop Fox; Brock Logan, Analyst I, Bishop Fox

Livestream: Bridging the Gap Between Military and Civilian Work

Tune into our livestream session to hear Skillbridge cybersecurity success stories.

Bishop Fox Tool Talk episode 7 CloudFox to find exploitable attack paths in cloud infrastructure presented by three security consultants

Tool Talk: CloudFox

Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!

Sandeep Singh featured headshot for exclusive session on the Nuclei security tool demo.

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Bishop Fox Tool Talk Episode 4 Unredacter with subtitle easily reverse redacted and pixelized text.

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Tool Talk Episode three: Nuclei security tool with headshots of the four speakers on dark background.

Tool Talk: Nuclei

In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.

Application Security webcast: Getting the Most of your Pen Test with Dan Petro headshot

Application Security: Getting the Most Out of Your Penetration Tests

Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.