Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel
Building Cybersecurity Companies: Stories and Lessons from Two Women Founders
Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption
Managed Penetration Testing Service Datasheet
Tomcat CVE-2025-24813: What You Need to Know
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Cosmos Integration for Jira Datasheet
Red Teaming: Is Your Security Program Ready for the Ultimate Test?
SonicWall-CVE2024-53704: Exploit Details
Patch Perfect: Harmonizing with LLMs to Find Security Vulns
Cosmos Explained: The People and the Platform Empowering Security Teams
Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption
Adversarial Controls Testing Datasheet
Physical Penetration Testing Datasheet
Achieving DORA Threat-Led Penetration Testing Requirements
Cosmos for ServiceNow Datasheet
Cosmos Integration with Jira Demo
Cosmos Integration with ServiceNow® Demo
FAQ Guide: Acquiring DORA Threat-Led Penetration Testing
Red vs Blue: Building a Well-Rounded Cybersecurity Career Path
Cyber Mirage: How AI is Shaping the Future of Social Engineering
Bishop Fox Application Penetration Testing Packages Methodology
Bishop Fox Adversarial Controls Testing Methodology
Bishop Fox Livestream at DEF CON 32
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.