Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
Offensive Security Arsenal: Building and Mastering Custom Security Tools
In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.
Red Team Reality: Advanced Strategies for Modern Attack Simulation
In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.
The Art of Human Hacking: Social Engineering Success Stories
In this session, hear from Chris Kirsch, CEO and co-founder of runZero.
Building Better Security Tools: Inside the Mind of an Open-Source Innovator
In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.
The Human Side of Security: Creating Impact Through Leadership & Advocacy
In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.
Malware Analysis Mastery: A Conversation with John Hammond
In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.
The Pentester's Journey: Expert Insights from a Security Veteran
In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.
JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing
Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.
Hacker Evolution: From Technical Mastery to Visionary Leadership
Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.
Outpacing Adversaries in the Cloud: An Offensive Security Guide
Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.
Ponemon Institute Report 2023
In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.
Breaking Down Q2's Critical CVEs: From Discovery to Exploitation
Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.