Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

DevSecOps and Application Penetration Testing: Defying the Myth.
Virtual Session

DevSecOps and Application Penetration Testing: Defying the Myth

On-demand webcast dives into the role of application penetration testing in today’s software development lifecycle (SDLC).

Illustration of computer exporting data
Workshops & Training

Fuzzing: Get the buzz on fuzz testing in software development

This slide deck includes:

  • Fuzzing Basics
  • How Fuzzing Works
  • Popular Fuzzing Tools
Cover slide of presentation: What Bad could Happen? Managing Application risk with Threat Modeling
Workshops & Training

Managing Application Security Risk with Threat Modeling

2023 Q1 DIGITAL Methodology HAA FI Tile
Methodology

Bishop Fox Hybrid Application Assessment Methodology

Overview of Bishop Fox’s methodology for hybrid application penetration testing.

2022 DIGITAL APT Methodology FI Tile
Methodology

Bishop Fox Application Penetration Testing Methodology

Overview of Bishop Fox’s methodology for application penetration testing.

Cover page .net roulette exploiting insecure deserialization in Telerik ui
Workshops & Training

.Net Roulette Exploiting Insecure Deserialization in Telerik UI

DerpCon 2020 presentation reviews how .NET deserialization works and how to get shells on real applications.

Ham Hacks: Breaking into the world of software defined radio illustrated with a piglet with a microphone
Workshops & Training

Ham Hacks: Breaking into the world of software-defined radio

DerpCon 2020 presentation explores how to find, capture, and reverse-engineer RF signals.

Presentation cover slide on reverse engineering of mobile applications
Workshops & Training

Reverse Engineering Mobile Apps

Presentation from BSides Las Vegas 2019 demonstrates the successful exploitation of transit system mobile apps.

Watch our Airdroid exploit demo video
Technical Briefing

AirDroid Exploit Demo

A vulnerability in the AirDroid application’s web interface made it possible for an attacker to essentially hijack a user’s phone. This video highlights the vulnerability’s implications and how an app’s permissions can become too pervasive.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.