Expert Analysis of Recent SaaS Attacks That Shocked Global Brands. Watch now

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Panel on mastering hacking tools featuring Leron Gray, Josh Shomo, David Vargas, and Dan Petro, hosted by Bishop Fox as part of 'The Art of Hacking' cybersecurity series.
Virtual Session

Offensive Security Arsenal: Building and Mastering Custom Security Tools

In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.

Red Teaming panel featuring Barret Darnell and Wesley Thurner from Intuit, and Savannah Lazzara from Optiv, part of Bishop Fox's 'The Art of Hacking' cybersecurity series.
Virtual Session

Red Team Reality: Advanced Strategies for Modern Attack Simulation

In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.

Chris Kirsch, Co-Founder and CEO of runZero, featured in Bishop Fox's 'The Art of Hacking' cybersecurity interview series.
Virtual Session

The Art of Human Hacking: Social Engineering Success Stories

In this session, hear from Chris Kirsch, CEO and co-founder of runZero.

Tom Hudson, Senior Security Consultant at Bishop Fox, featured in 'The Art of Hacking' cybersecurity video series.
Virtual Session

Building Better Security Tools: Inside the Mind of an Open-Source Innovator

In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.

Chloé Messdaghi, Head of Threat Research at Protect AI, featured in Bishop Fox's 'The Art of Hacking' cybersecurity video series.
Virtual Session

The Human Side of Security: Creating Impact Through Leadership & Advocacy

In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.

John Hammond, Cybersecurity Researcher, Educator, and Content Creator at Huntress, featured in Bishop Fox's 'The Art of Hacking' video series.
Virtual Session

Malware Analysis Mastery: A Conversation with John Hammond

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Phillip Wylie, Security Solutions Specialist at CYE, featured in Bishop Fox's 'The Art of Hacking' series – cybersecurity video event branding.
Virtual Session

The Pentester's Journey: Expert Insights from a Security Veteran

In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.

Black background with purple neon, turquoise, and white letters. Photo of speaker, Tom Hudson.
Virtual Session

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

The Art of Hacking neon logo on dark background.
Virtual Session

Hacker Evolution: From Technical Mastery to Visionary Leadership

Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.

Preview of Bishop Fox new offensive security guide on Cloud Penetration Testing titled: Outpacing adversaries in the cloud
Guide

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.

Ponemon Institute logo with teal title for new report: The State of Offensive Security 2023, creating a Blueprint for Success.
Report

Ponemon Institute Report 2023

In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.

What the Vuln neon logo with the subtitle: Technical Series Quartely Roundup subtitle and featuring a fox in a hoody pointing to the logo..
Virtual Session

Breaking Down Q2's Critical CVEs: From Discovery to Exploitation

Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.