Expert Analysis of Recent SaaS Attacks That Shocked Global Brands. Watch now

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Bishop Fox on-demand webcast on Threat Modeling in DevSecOps presented by security experts Tom Eston and Chris Bush
Virtual Session

What Bad Could Happen? Managing Application Risk with Threat Modeling

What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.

DevSecOps and Application Penetration Testing: Defying the Myth.
Virtual Session

DevSecOps and Application Penetration Testing: Defying the Myth

On-demand webcast dives into the role of application penetration testing in today’s software development lifecycle (SDLC).

Illustration of computer exporting data
Workshops & Training

Fuzzing: Get the buzz on fuzz testing in software development

This slide deck includes:

  • Fuzzing Basics
  • How Fuzzing Works
  • Popular Fuzzing Tools
Cover slide of presentation: What Bad could Happen? Managing Application risk with Threat Modeling
Workshops & Training

Managing Application Security Risk with Threat Modeling

2023 Q1 DIGITAL Methodology HAA FI Tile
Methodology

Bishop Fox Hybrid Application Assessment Methodology

Overview of Bishop Fox’s methodology for hybrid application penetration testing.

2022 DIGITAL APT Methodology FI Tile
Methodology

Bishop Fox Application Penetration Testing Methodology

Overview of Bishop Fox’s methodology for application penetration testing.

Cover page .net roulette exploiting insecure deserialization in Telerik ui
Workshops & Training

.Net Roulette Exploiting Insecure Deserialization in Telerik UI

DerpCon 2020 presentation reviews how .NET deserialization works and how to get shells on real applications.

Ham Hacks: Breaking into the world of software defined radio illustrated with a piglet with a microphone
Workshops & Training

Ham Hacks: Breaking into the world of software-defined radio

DerpCon 2020 presentation explores how to find, capture, and reverse-engineer RF signals.

Presentation cover slide on reverse engineering of mobile applications
Workshops & Training

Reverse Engineering Mobile Apps

Presentation from BSides Las Vegas 2019 demonstrates the successful exploitation of transit system mobile apps.

Watch our Airdroid exploit demo video
Technical Briefing

AirDroid Exploit Demo

A vulnerability in the AirDroid application’s web interface made it possible for an attacker to essentially hijack a user’s phone. This video highlights the vulnerability’s implications and how an app’s permissions can become too pervasive.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.