Expert Analysis of Recent SaaS Attacks That Shocked Global Brands. Watch now

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Video of 21 Questions series with Lindsay Von Tish
Virtual Session

Women in Cybersecurity: 21 Questions with Security Consultant Lindsay Von Tish

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Lindsay Von, Security Consultant II.

Headshot of speaker Derek Rush with title text "Penetration Testing: Navigating PCI DSS Compliance"
Virtual Session

Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing

Security Consultant Derek Rush shares how organizations can transform mandatory PCI penetration tests from compliance exercises into meaningful security assessments by following industry guidance and adopting attacker-focused methodologies.

Screenshot of Caleb Gross in a video for News Insights focused on the Invanti vulnerability
Executive Briefing

The Zero-Day Arms Race: Why Asset Management Trumps Vulnerability Whack-a-Mole

Caleb Gross, Director of Capability Development, gives his insight on the dynamics of exploit creation and execution and what organizations can do to not only mitigate risk from this event, but also stay focused on minimizing exposure across the business.

Black and dark purple background with speaker headshot on left side. Teal background in speaker headshot. White and teal letters.
Virtual Session

Exploiting Java Deserialization in GWT: From Detection to Command Execution

Watch our exclusive livestream with Ben Lincoln, Managing Principal at Bishop Fox, to learn about GWT web application vulnerabilities, exploitation strategies, and security enhancement recommendations.

Pwing the Domain with Silver Framework with purple and black background.
Workshops & Training

Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation

Senior security expert Jon Guild demonstrates how to use the Sliver C2 framework to develop advanced offensive security skills. Arm yourself with the knowledge and skills of enumeration, lateral movement, and escalation techniques from first-hand experience in a vulnerable lab environment.

Video player with Trevin Edgeworth, Red Team Practice Director
Executive Briefing

What Unpatched Vulnerabilities Reveal: A Red Teamer's Perspective by Trevin Edgeworth, Director of Red Team

Bishop Fox's Red Team Director, Trevin Edgeworth, spotlights two notable vulnerabilities - left unpatched for years on end and discusses how unpatched vulnerabilities can wreak havoc on businesses. One, an unpatched six-year-old flaw in Microsoft Office, the other in Google Web Toolkit (GWT), unaddressed for eight years.

Trevin Edgeworth, Red Team Practice Director at Bishop Fox, presenting a News Insights segment titled ‘Does X Mark a Target?’ in a virtual video discussion.
Executive Briefing

Does X Mark a Target? with Trevin Edgeworth, Director of Red Team

In light of the recent security breaches involving Bitcoin and SEC’s X account, our Red Team Practice Director, Trevin Edgeworth, analyzes the role of fluctuating security programs in these incidents. He discusses how attackers exploit confusion, communication gaps, and vague policies, and identifies weak points in shared security responsibility.

Headshot of Dardan Prebreza, senior security consultant and webcast title: "How does social engineering works? From planning to execution"
Virtual Session

How Does Social Engineering Work? From Planning to Execution

Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.

2024 Q1 DIGITAL DS COSMOS Tile
Datasheet

Cosmos Datasheet

Learn how Cosmos combines attack surface management with expert-driven penetration testing to help security teams identify and remediate dangerous exposures before attackers can exploit them.
Managed Service Cosmos Attack Surface Management datasheet cover pages floating on dark background.
Datasheet

Cosmos Attack Surface Management (CASM) Datasheet

Learn how this innovative managed service combines advanced attack surface technology with expert-driven testing to help you quickly close the window of vulnerability and strengthen resilience against ever-changing threats.
Screenshot of a Cloud Security Podcast interview featuring a demo of CloudFoxable, a gamified cloud hacking sandbox developed by the Bishop Fox cloud penetration testing team.
Workshops & Training

CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks

Watch the CloudFoxable demo to see a gamified cloud hacking sandbox where users can find latent attack paths in an intentionally vulnerable AWS environment.

Bishop Fox Video Matt Twells CISO Special.
Executive Briefing

The New CISO Special: Organizing the Chaos in Your First 100 Days

With Senior Solutions Architect Matt Twells, Bishop Fox offers a comprehensive guide to ease into your role confidently, providing a strategic framework to streamline your initial efforts.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.