AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Workshops & Training

Workshop Series: Inside Cirro

Workshop Series: Inside Cirro

Get a practical look at Cirro with creator Leron Gray, a new open-source tool for modeling Azure and Entra ID environments as relationship graphs to make privilege and attack paths easier to understand.

Watch Workshop
Virtual Sessions

Tactics of Deception: Protecting Trust and Purpose

Tactics of Deception: Protecting Trust and Purpose

Trained people, strong controls, still getting fooled? This session breaks down how modern social engineering exploits trust and urgency, and what actually works to stop it.

Watch Session
Podcast

Speed, Trust, and the Compromised Workbench

Speed, Trust, and the Compromised Workbench

From uncovering how attackers are collapsing timelines and exploiting trust relationships, to turning developer environments into the fastest path to full compromise, this week’s conversation looks at where defenders still have room to slow them down.

Learn More
Podcast

Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks

Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks

In this Initial Access podcast episode, we examine how attackers are gaining initial access through social engineering, identity abuse, and vulnerable edge infrastructure.

Learn More
Customer Stories

Designing for Resilience: LastPass Prioritizes Security in Move to Cloud

Designing for Resilience: LastPass Prioritizes Security in Move to Cloud

Rebuilding in AWS gave LastPass a clean slate, but it also meant getting the architecture right. To be sure their security boundaries would hold, they partnered with Bishop Fox to test their cloud environment under realistic conditions and strengthen it where it mattered most.

Read Story
Podcast

AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks

AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks

In this Initial Access podcast episode, we cover AI coding agents operating inside developer environments, automated attack platforms accelerating exploitation cycles, long-lived connected devices exposing unexpected telemetry risks, and why identity systems remain the primary entry point for attackers.

Learn More
Customer Stories

Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure

Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure

A major airline technology platform turned to Bishop Fox after routine assessments kept missing the mark. What followed revealed unauthorized PCI database access, misconfigured IAM roles spanning hundreds of instances, and lateral movement across Active Directory domains — driving immediate remediation and stronger customer trust.

Read Story
Podcast

Autonomous AI, Broken Guardrails, and Geopolitics

Autonomous AI, Broken Guardrails, and Geopolitics

In this Initial Access podcast episode, we cover autonomous vulnerability discovery, AI agents that ignore instructions, and why models are becoming strategic national assets.

Learn More
Reports

2026 GigaOm Radar for Attack Surface Management

2026 GigaOm Radar for Attack Surface Management

Get an overview of the 2026 Attack Surface Management (ASM) market — along with the key features and business criteria met by the top solutions — and learn why Bishop Fox was named Leader and Fast Mover by the analysts at GigaOm.

Read Report
Virtual Sessions

The Role of AI in Modernizing Enterprise Application Security

The Role of AI in Modernizing Enterprise Application Security

Modern enterprise apps are sprawling, fast moving, and AI accelerated, yet traditional testing cannot keep up. Join this session to learn how AI assisted, expert led testing expands security coverage at scale, improves consistency, and strengthens protection across complex enterprise application portfolios.

Watch Session
Podcast

SSO Phishing, Patching Failures, Exposed APIs

SSO Phishing, Patching Failures, Exposed APIs

In this Initial Access podcast episode, we cover SSO phishing, patching failures, exposed APIs, and zombie infrastructure remind us that basic security hygiene still decides the outcome.

Learn More
Customer Stories

Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats

Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats

A Fortune 500 energy provider faces constant threats from nation-state actors targeting critical infrastructure. Partnering with Bishop Fox for Attack Surface Management and red team assessments, the company gained continuous visibility into their external perimeter...

Read Story
Podcast

Deepfakes, Spyware Kits, and LLMs for Hire

Deepfakes, Spyware Kits, and LLMs for Hire

In this Initial Access podcast episode, we cover prompt injection, a hijacked Outlook add-in, commoditized mobile spyware, AI executive deepfake scams, IT-to-OT pivoting, and nation-state use of commercial LLMs to accelerate exploitation.

Learn More
Workshops & Training

Building Tools: What, When, and How

Building Tools: What, When, and How

Surrounded by security tools but still tempted to “just build it”? This hands-on workshop breaks down when custom tooling is worth it, when it’s not, and how to build fast, focused tools without overengineering.

Watch Workshop
Guides

Red Team Vendor Evaluation Worksheet

Red Team Vendor Evaluation Worksheet

The Red Team Vendor Evaluation Matrix Worksheet is designed to help security leaders evaluate red team vendors thoughtfully before engagement using a structured, question-driven approach.

Read Guide
Podcast

Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk

Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk

In this Initial Access podcast episode, we cover the rollback of federal software security guidance, insider-driven access risks, ongoing state-sponsored espionage, and the security implications of giving AI tools deep control over infrastructure.

Learn More
Solution Briefs

Application Portfolio Penetration Testing Solution Brief

Application Portfolio Penetration Testing Solution Brief

Download our solution brief. Learn how to secure entire application portfolios with attacker-realistic testing and expert-validated, trusted results.

Read Briefing
Virtual Sessions

AI & Security Risks: A Cyber Leadership Panel

AI & Security Risks: A Cyber Leadership Panel

Watch a fireside chat with cybersecurity and AI leaders on today’s real AI security risks. Learn where risk is emerging, how leaders set ownership, the true cost of securing AI, and practical steps teams use to protect AI systems and data.

Watch Session
Podcast

Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet

Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet

In this Initial Access podcast episode, we cover AI prompt injection risks, continued social engineering via LinkedIn and QR codes, credential theft and session hijacking, patch reliability and appliance security, and how AI is being used to accelerate malware development—distinguishing meaningful risk from overhyped claims.

Learn More
Virtual Sessions

Application Security: Getting More Out of Your Pen Tests

Application Security: Getting More Out of Your Pen Tests

Application pen tests cost real time and money. Learn how to get real value from them. Bishop Fox lead researcher Dan Petro explains what good app tests include, how to evaluate AI-powered testing, and the questions that matter before and after an engagement.

Watch Session
Guides

Fortifying Your Applications: A Guide to Penetration Testing

Fortifying Your Applications: A Guide to Penetration Testing

Download this guide to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.

Read Guide
Workshops & Training

Sliver Workshop Part 3: Building Better Encoders

Sliver Workshop Part 3: Building Better Encoders

In our third Sliver workshop, we explore how Sliver handles traffic encoding by default and how attackers can extend its capabilities with custom Wasm-based encoders. We dive into Sliver’s encoder framework works, what’s possible with WebAssembly, and how to design and test your own encoders.

Watch Workshop
Virtual Sessions

Red Teaming: The Essential Tool for Security Leaders

Red Teaming: The Essential Tool for Security Leaders

Watch Trevin Edgeworth, Red Team Practice Director at Bishop Fox, in this virtual session where he will break down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions in the current AI landscape.

Watch Session
Virtual Sessions

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Join Senior Security Consultant Nick Cerne for “Peeling Back the Plastic: Finding 0-Days in IoT Devices” on Tuesday, Nov. 18. Learn hands-on techniques for uncovering hidden vulnerabilities in consumer IoT devices and advancing your IoT security research skills.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.