Skip to content
  • Home
  • Origins
  • Services
    • Application Security
      • Web Application Penetration Testing
      • API Penetration Testing
      • Mobile Application Penetration Testing​
      • Source Code Reviews
      • Threat Modeling
      • Architecture Reviews
    • Infrastructure Security
      • Internal Network Penetration Testing
      • External Network Penetration Testing
      • Active Directory Security Assessments
      • Wireless Network Penetration Testing
      • Host Reviews
      • Firewall Configuration Reviews
    • Cloud Security
      • Cloud Configuration Reviews
      • Cloud Penetration Testing
    • Adversary Simulations
      • Red Teaming
      • Purple teaming
      • OSINT
      • Phishing Simulations
    • DevSecOps
      • Container Security
      • Kubernetes configuration reviews
    • Other
      • Managed Vulnerability Scanning
      • PCI DSS Security Assessments
      • Hardware Security Assessments
      • Smart Contracts Security Assessments
  • Managed SOC
  • Academy
  • Advisory
  • Blog
  • Contact
Understanding False Positives in Penetration Testing

Understanding False Positives in Penetration Testing

June 29, 2023

False positives in penetration testing, also known as pen testing, are a crucial component of cybersecurity. Penetration testing, also known as pen testing, is a

Read More »
Penetration Testing Costs: Exploring Four Key Elements Blog

Penetration Testing Costs: Exploring Four Key Elements

June 26, 2023

Penetration testing is essential as it protects businesses in today’s digital environment. Simulation of real-world attacks allows enterprises to identify any vulnerabilities within their systems

Read More »
Mastering Burp Suite Extension Development

Mastering Burp Suite Extension Development

June 20, 2023

Burp Suite, developed by PortSwigger, is a powerful web application security testing tool widely used by security professionals and penetration testers. It offers a comprehensive

Read More »

What is LLMNR Poisoning and How to Avoid It

June 16, 2023

As a cybersecurity professional, I’ve come across various attacks that threaten network security. LLMNR poisoning is one such threat, which poses great danger if left

Read More »
6 Proven Tips to Protect Your Business from Cyber Threats Blog

6 Proven Tips to Protect Your Business from Cyber Threats

June 3, 2023

As technology advances, cyber security threats have become more sophisticated and dangerous. These threats can cause significant damage to businesses, including data breaches, financial loss,

Read More »
SMB Signing Blog

How to Find and Fix SMB Signing Disabled Vulnerability

June 1, 2023

As a cybersecurity professional, I often encounter various vulnerabilities that hackers can exploit to gain unauthorized access to sensitive information. One such vulnerability is SMB

Read More »

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • Origins
  • Services
  • Blog

Legal

  • Privacy Policy
  • Terms of Service
  • Contact

Newsletter

Required Login
Please Login for Submit Form.
Close
Success

Thank you! Form submitted successfully.

This field is required

© 2025 Redfox Cyber Security Inc. All rights reserved.