Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.
News Insights: Boy, that Escalated Quickly - How Zero-Day Disclosures Alter Attacker Strategy
Caleb Gross, Director of Capability Development, gives his insight on the dynamics of exploit creation and execution and what organizations can do to not only mitigate risk from this event, but also stay focused on minimizing exposure across the business.
GWT Java Deserialization: Unpatched and Unauthenticated
Watch our exclusive livestream with Ben Lincoln, Managing Principal at Bishop Fox, to learn about GWT web application vulnerabilities, exploitation strategies, and security enhancement recommendations.
Pwning the Domain with Sliver Framework
Senior security expert Jon Guild demonstrates how to use the Sliver C2 framework to develop advanced offensive security skills. Arm yourself with the knowledge and skills of enumeration, lateral movement, and escalation techniques from first-hand experience in a vulnerable lab environment.
News Insights: Does X Mark a Target? with Trevin Edgeworth, Director of Red Team
In light of the recent security breaches involving Bitcoin and SEC’s X account, our Red Team Practice Director, Trevin Edgeworth, analyzes the role of fluctuating security programs in these incidents. He discusses how attackers exploit confusion, communication gaps, and vague policies, and identifies weak points in shared security responsibility.
News Insights: Patch Procrastination with Trevin Edgeworth, Director of Red Team
Bishop Fox's Red Team Director, Trevin Edgeworth, spotlights two notable vulnerabilities - left unpatched for years on end and discusses how unpatched vulnerabilities can wreak havoc on businesses. One, an unpatched six-year-old flaw in Microsoft Office, the other in Google Web Toolkit (GWT), unaddressed for eight years.
How Does Social Engineering Work? From Planning to Execution
Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.
Cosmos Datasheet
Learn how Cosmos combines attack surface management with expert-driven penetration testing to help security teams identify and remediate dangerous exposures before attackers can exploit them. |
Cosmos External Penetration Testing (CEPT) Datasheet
Learn how Cosmos External Penetration Testing (CEPT) expands the scope of Cosmos Attack Surface Management to deliver the highest level of attack surface protection and meet compliance requirements.
Cosmos Attack Surface Management (CASM) Datasheet
Learn how this innovative managed service combines advanced attack surface technology with expert-driven testing to help you quickly close the window of vulnerability and strengthen resilience against ever-changing threats. |
Cosmos Application Penetration Testing (CAPT) Datasheet
Learn how to strengthen the security of your critical business applications with authenticated assessments that uncover the full spectrum of exposures above and below the surface. |
Cosmos Application Penetration Testing Methodology
This methodology document provides an overview of Bishop Fox's Cosmos Application Penetration Testing engagements.
Cloud Security Podcast: CloudFoxable Demo
Watch the CloudFoxable demo to see a gamified cloud hacking sandbox where users can find latent attack paths in an intentionally vulnerable AWS environment.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.