AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Training session title: Swagger Jacker Training about improved auditing of OpenAPI Definition Files with the headshot os security consultant Tony West, a Bishop Fox adversarial operator.
Workshops & Training

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.

Watch Workshop
Video thumbnail featuring the speaker headshot, Jon Guild, and the title of the webcast: How to Ace the OSEP exam with the Sliver Framework.
Workshops & Training

Ace the OSEP Exam with Sliver Framework

Unlock the secrets of passing the OSEP exam with our senior security expert, Jon Guild. Join us as Jon shares his invaluable tips and tricks for conquering this benchmark exam designed for penetration testers.

Watch Workshop
Video thumbnail featuring the three panelists headshots and the title of the fireside chat on dark brackground.
Virtual Sessions

Pragmatic AI & LLM Security Mitigations for Enterprises

Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.

Watch Session
Purple gradient background with headshot of speaker on left side.
Virtual Sessions

OWASP ASVS: Unlocking Stronger Application Security

Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.

Watch Session
Bridging the Gap Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response with purple background and Bishop Fox logo.
Virtual Sessions

Strengthening Incident Response: Combining Tabletop Exercises with Red Team Engagements

Learn how integrating tabletop exercises with red team assessments creates a more comprehensive evaluation of your organization's incident response capabilities. Security expert Shanni Prutchi shares practical approaches for testing both your technical controls and response processes against realistic attack scenarios.

Watch Session
Preview of the cover page of the Cosmos report on Data Analysis unveiling critical vulnerabilities in attack surfaces.
Reports

Cosmos: Protecting the Perimeter

To understand the vulnerability landscape that organizations are up against, we meticulously examined 17,000 data points, extracted from over 110 billion automations, within a 12-month period. Download the report to view a comprehensive propensity model that allows security and organizational leadership to visualize the potential impact of leaving vulnerable exposures to chance.

Read Report
Ponemon report on offensive security for Financial Services title with preview of the guide.
Guides

The Offensive Security Blueprint for Financial Services

Bishop Fox's Financial Services industry cut provides a comprehensive analysis of offensive security trends within financial services, using industry data gathered from our joint research report with the Ponemon Institute.

Read Guide
AppSec panel 'Hacker’s Arsenal in AppSec' featuring Erez Yalon from Checkmarx, Vandana Verma from Snyk, and Joylynn Kirui from Microsoft, hosted by Bishop Fox for 'The Art of Hacking' series.
Virtual Sessions

AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies

In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.

Watch Session
Cloud exploitation panel featuring Matt Johansen of Reddit, Andrew Martin of ControlPlane, and Moses Frost of Neuvik, presented by Bishop Fox in 'The Art of Hacking' cybersecurity series.
Virtual Sessions

Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities

In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.

Watch Session
Panel on mastering hacking tools featuring Leron Gray, Josh Shomo, David Vargas, and Dan Petro, hosted by Bishop Fox as part of 'The Art of Hacking' cybersecurity series.
Virtual Sessions

Offensive Security Arsenal: Building and Mastering Custom Security Tools

In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.

Watch Session
Red Teaming panel featuring Barret Darnell and Wesley Thurner from Intuit, and Savannah Lazzara from Optiv, part of Bishop Fox's 'The Art of Hacking' cybersecurity series.
Virtual Sessions

Red Team Reality: Advanced Strategies for Modern Attack Simulation

In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.

Watch Session
Chris Kirsch, Co-Founder and CEO of runZero, featured in Bishop Fox's 'The Art of Hacking' cybersecurity interview series.
Virtual Sessions

The Art of Human Hacking: Social Engineering Success Stories

In this session, hear from Chris Kirsch, CEO and co-founder of runZero.

Watch Session
Tom Hudson, Senior Security Consultant at Bishop Fox, featured in 'The Art of Hacking' cybersecurity video series.
Virtual Sessions

Building Better Security Tools: Inside the Mind of an Open-Source Innovator

In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.

Watch Session
Chloé Messdaghi, Head of Threat Research at Protect AI, featured in Bishop Fox's 'The Art of Hacking' cybersecurity video series.
Virtual Sessions

The Human Side of Security: Creating Impact Through Leadership & Advocacy

In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.

Watch Session
John Hammond, Cybersecurity Researcher, Educator, and Content Creator at Huntress, featured in Bishop Fox's 'The Art of Hacking' video series.
Virtual Sessions

Malware Analysis Mastery: A Conversation with John Hammond

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Watch Session
Phillip Wylie, Security Solutions Specialist at CYE, featured in Bishop Fox's 'The Art of Hacking' series – cybersecurity video event branding.
Virtual Sessions

The Pentester's Journey: Expert Insights from a Security Veteran

In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.

Watch Session
Black background with purple neon, turquoise, and white letters. Photo of speaker, Tom Hudson.
Virtual Sessions

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

Watch Session
The Art of Hacking neon logo on dark background.
Virtual Sessions

Hacker Evolution: From Technical Mastery to Visionary Leadership

Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.

Watch Session
Preview of Bishop Fox new offensive security guide on Cloud Penetration Testing titled: Outpacing adversaries in the cloud
Guides

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.

Read Guide
Ponemon Institute logo with teal title for new report: The State of Offensive Security 2023, creating a Blueprint for Success.
Reports

Ponemon Institute Report 2023

In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.

Read Report
What the Vuln neon logo with the subtitle: Technical Series Quartely Roundup subtitle and featuring a fox in a hoody pointing to the logo..
Virtual Sessions

Breaking Down Q2's Critical CVEs: From Discovery to Exploitation

Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.

Watch Session
Get the Blueprint Ponemon Institute webcast with headshots of Larry Ponemon and Tom Eston.
Virtual Sessions

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Watch Session
Preview of Bishop Fox Red teaming Guide cover page on dark purple background.
Guides

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Read Guide
Panelist headshots for fireside chat  How the National Cybersecurity Strategy Will Shape the Future of Offensive Security.
Virtual Sessions

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.