AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Customer Stories

Designing for Resilience: LastPass Prioritizes Security in Move to Cloud

Designing for Resilience: LastPass Prioritizes Security in Move to Cloud

Rebuilding in AWS gave LastPass a clean slate, but it also meant getting the architecture right. To be sure their security boundaries would hold, they partnered with Bishop Fox to test their cloud environment under realistic conditions and strengthen it where it mattered most.

Read Story
Podcast

AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks

AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks

In this Initial Access podcast episode, we cover AI coding agents operating inside developer environments, automated attack platforms accelerating exploitation cycles, long-lived connected devices exposing unexpected telemetry risks, and why identity systems remain the primary entry point for attackers.

Learn More
Customer Stories

Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure

Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure

A major airline technology platform turned to Bishop Fox after routine assessments kept missing the mark. What followed revealed unauthorized PCI database access, misconfigured IAM roles spanning hundreds of instances, and lateral movement across Active Directory domains — driving immediate remediation and stronger customer trust.

Read Story
Podcast

Autonomous AI, Broken Guardrails, and Geopolitics

Autonomous AI, Broken Guardrails, and Geopolitics

In this Initial Access podcast episode, we cover autonomous vulnerability discovery, AI agents that ignore instructions, and why models are becoming strategic national assets.

Learn More
Reports

2026 GigaOm Radar for Attack Surface Management

2026 GigaOm Radar for Attack Surface Management

Get an overview of the 2026 Attack Surface Management (ASM) market — along with the key features and business criteria met by the top solutions — and learn why Bishop Fox was named Leader and Fast Mover by the analysts at GigaOm.

Read Report
Virtual Sessions

The Role of AI in Modernizing Enterprise Application Security

The Role of AI in Modernizing Enterprise Application Security

Modern enterprise apps are sprawling, fast moving, and AI accelerated, yet traditional testing cannot keep up. Join this session to learn how AI assisted, expert led testing expands security coverage at scale, improves consistency, and strengthens protection across complex enterprise application portfolios.

Watch Session
Podcast

SSO Phishing, Patching Failures, Exposed APIs

SSO Phishing, Patching Failures, Exposed APIs

In this Initial Access podcast episode, we cover SSO phishing, patching failures, exposed APIs, and zombie infrastructure remind us that basic security hygiene still decides the outcome.

Learn More
Customer Stories

Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats

Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats

A Fortune 500 energy provider faces constant threats from nation-state actors targeting critical infrastructure. Partnering with Bishop Fox for Attack Surface Management and red team assessments, the company gained continuous visibility into their external perimeter...

Read Story
Podcast

Deepfakes, Spyware Kits, and LLMs for Hire

Deepfakes, Spyware Kits, and LLMs for Hire

In this Initial Access podcast episode, we cover prompt injection, a hijacked Outlook add-in, commoditized mobile spyware, AI executive deepfake scams, IT-to-OT pivoting, and nation-state use of commercial LLMs to accelerate exploitation.

Learn More
Workshops & Training

Building Tools: What, When, and How

Building Tools: What, When, and How

Surrounded by security tools but still tempted to “just build it”? This hands-on workshop breaks down when custom tooling is worth it, when it’s not, and how to build fast, focused tools without overengineering.

Watch Workshop
Guides

Red Team Vendor Evaluation Worksheet

Red Team Vendor Evaluation Worksheet

The Red Team Vendor Evaluation Matrix Worksheet is designed to help security leaders evaluate red team vendors thoughtfully before engagement using a structured, question-driven approach.

Read Guide
Solution Briefs

Application Portfolio Penetration Testing Solution Brief

Application Portfolio Penetration Testing Solution Brief

Download our solution brief. Learn how to secure entire application portfolios with attacker-realistic testing and expert-validated, trusted results.

Read Briefing
Podcast

Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk

Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk

In this Initial Access podcast episode, we cover the rollback of federal software security guidance, insider-driven access risks, ongoing state-sponsored espionage, and the security implications of giving AI tools deep control over infrastructure.

Learn More
Virtual Sessions

AI & Security Risks: A Cyber Leadership Panel

AI & Security Risks: A Cyber Leadership Panel

Watch a fireside chat with cybersecurity and AI leaders on today’s real AI security risks. Learn where risk is emerging, how leaders set ownership, the true cost of securing AI, and practical steps teams use to protect AI systems and data.

Watch Session
Podcast

Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet

Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet

In this Initial Access podcast episode, we cover AI prompt injection risks, continued social engineering via LinkedIn and QR codes, credential theft and session hijacking, patch reliability and appliance security, and how AI is being used to accelerate malware development—distinguishing meaningful risk from overhyped claims.

Learn More
Virtual Sessions

Application Security: Getting More Out of Your Pen Tests

Application Security: Getting More Out of Your Pen Tests

Application pen tests cost real time and money. Learn how to get real value from them. Bishop Fox lead researcher Dan Petro explains what good app tests include, how to evaluate AI-powered testing, and the questions that matter before and after an engagement.

Watch Session
Guides

Fortifying Your Applications: A Guide to Penetration Testing

Fortifying Your Applications: A Guide to Penetration Testing

Download this guide to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.

Read Guide
Workshops & Training

Sliver Workshop Part 3: Building Better Encoders

Sliver Workshop Part 3: Building Better Encoders

In our third Sliver workshop, we explore how Sliver handles traffic encoding by default and how attackers can extend its capabilities with custom Wasm-based encoders. We dive into Sliver’s encoder framework works, what’s possible with WebAssembly, and how to design and test your own encoders.

Watch Workshop
Virtual Sessions

Red Teaming: The Essential Tool for Security Leaders

Red Teaming: The Essential Tool for Security Leaders

Watch Trevin Edgeworth, Red Team Practice Director at Bishop Fox, in this virtual session where he will break down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions in the current AI landscape.

Watch Session
Virtual Sessions

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Join Senior Security Consultant Nick Cerne for “Peeling Back the Plastic: Finding 0-Days in IoT Devices” on Tuesday, Nov. 18. Learn hands-on techniques for uncovering hidden vulnerabilities in consumer IoT devices and advancing your IoT security research skills.

Watch Session
Reports

Product Security Reviews: The Basics Are Still the Breach

Product Security Reviews: The Basics Are Still the Breach

The Product Security Reviews Report is a data-driven analysis that distills two years of hands-on testing across healthcare, IoT, industrial, and financial systems into a single, sobering insight: attackers don’t need sophistication when simplicity still works. This guide helps security leaders understand why fundamental flaws remain the root cause of breaches—and how to turn that reality into a roadmap for measurable improvement.

Read Report
Virtual Sessions

The Basics are the Breach: Lessons from Real-World Product Security Reviews

The Basics are the Breach: Lessons from Real-World Product Security Reviews

In this live virtual session, you’ll explore two years of product testing across healthcare, IoT, industrial, and financial systems—and see how “basic” vulnerabilities continue to cause the biggest damage. Learn how small oversights like default credentials, broken cryptography, and insecure configurations can be chained into full-scale breaches, and what you can do to stop them.

Watch Session
Datasheets

AI & LLM Security Testing Datasheet

AI & LLM Security Testing Datasheet

Understanding your exposure is essential to building secure and resilient AI systems. Bishop Fox AI/LLM security assessments provide the experience and expertise to help you navigate this emerging threat landscape.

Download Datasheet
Workshops & Training

Demystifying 5G Security: Understanding the Registration Protocol

Demystifying 5G Security: Understanding the Registration Protocol

In this hands-on workshop, Senior Security Consultant Drew Jones will break down the fundamentals of the 5G registration protocol, explore where security gaps can emerge, and walk through a live simulated lab demonstrating real-world vulnerabilities.

Watch Workshop

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.