Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Red Team Activated: Testing a Global Risk Intelligence Platform
To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.
Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance
Ventrilo.ai partnered with Bishop Fox for application penetration testing and AI security assessments to ensure its writing assistant protects sensitive user data and withstands real-world threats.
Red Team Readiness Guide
The Red Team Readiness Guide is a practical, question-driven planning framework that helps security leaders align stakeholders, clarify objectives, and evaluate organizational readiness ahead of a Red Team engagement. Use it to avoid common pitfalls, define business-relevant goals, and set the stage for maximum impact.
The Human Element of AI Security Solution Brief
Learn how expert-driven testing goes beyond automation to thoroughly assess AI and LLM applications with techniques grounded in human behavior and social engineering.
Red Team Readiness Assessment
The Red Team Readiness Assessment is a guided self-assessment worksheet that helps security teams evaluate their preparedness, align stakeholders, and plan more effective Red Team engagements. Use it to define objectives, set scope, and establish the protocols needed for a successful simulation.
Breaking AI: Inside the Art of LLM Pen Testing
Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.
Sliver Workshop Part 2: Staging & Automation
In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.
Red Team & Adversarial Emulation Solution Brief
With a range of approaches that simulate breach scenarios at your organization, adversarial emulation is the most effective way to know if your team is prepared to detect, respond, and recover—before a real breach happens.
Architecting Cloud Security Testing in the GenAI Era
Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.
Sliver Workshop Part 1: Getting Started & 1.6 Features
Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.
Panel: PCI DSS 4.0 Expert Breakdown
This executive brief features an expert discussion focusing on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing.
Attacking & Defending Deepfakes: A Red Teamer’s Perspective
Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.
Attack Surface Management: Measuring Real-World Impact
Our experts explain how to tell if your ASM is effective, what teams often miss, and why it’s more than just tracking known vulnerabilities.
The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel
This video showcases leading voices in cybersecurity explaining their examinations into how AI is simultaneously transforming cyber defense and supercharging attacker capabilities. Together, they explored how GenAI is reshaping the threat landscape and what security leaders must do to adapt.
Building Cybersecurity Companies: Stories and Lessons from Two Women Founders
Christie Terrell, CISO at Bishop Fox, interviews Deidre Diamond, Founder & CEO of CyberSN and Founder of Secure Diversity, and Juliet Okafor, Founder & CEO of RevolutionCyber about their experiences founding their own companies in the cybersecurity industry.
Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption
Researchers walk through cracking SonicOSX: extracting keys, decrypting firmware, and analyzing its architecture at DistrictCon 2025.
Managed Penetration Testing Service Datasheet
Learn how to minimize the complexity and maximize the effectiveness of large security testing initiatives with our comprehensive program management.
Tomcat CVE-2025-24813: What You Need to Know
A breakdown of CVE-2025-24813 in Apache Tomcat—what it is, who’s actually at risk, and why most users likely aren’t affected. Keep calm and patch your servers.
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Watch Alethe Denis, Senior Security Consultant, for an engaging deep dive into the world of Red Teaming. Through real-life stories and expert analysis, this webcast will explore the triumphs, missteps, and critical takeaways from Red Team engagements.
Cosmos Integration for Jira Datasheet
| Learn how to effortlessly sync validated exposures from the Cosmos portal into your Jira environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them. |
Red Teaming: Is Your Security Program Ready for the Ultimate Test?
In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
SonicWall-CVE2024-53704: Exploit Details
Watch a quick explainer of Bishop Fox's successful exploit of SonicWall CVE-2024-53704.
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Senior Security Consultant Alethe Denis takes audiences on a riveting journey into the realm of Red Teaming through captivating narratives and insightful analysis.
Patch Perfect: Harmonizing with LLMs to Find Security Vulns
This talk led by Bishop Fox researchers Caleb Gross & Josh Shomo cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.