Skip to content
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
HTTP Parameter Pollution: Manipulating Web App Vulnerabilities

HTTP Parameter Pollution: Manipulating Web App Vulnerabilities 

October 31, 2023

HTTP Parameter Pollution (HPP) is a cunning technique employed by attackers to manipulate or retrieve hidden information by injecting encoded query string delimiters into existing

Read More »
Unlocking Azure AD Security Secrets: A Comprehensive Guide

Unlocking Azure AD Security Secrets: A Comprehensive Guide

October 30, 2023

In this blog, we will discuss Azure AD, Fundamentals of penetration testing, key security features of Azure AD for pen testing, steps that will help

Read More »
Understanding and Securing Amazon Cognito: A Comprehensive Guide

Understanding and Securing Amazon Cognito: A Comprehensive Guide 

October 27, 2023

Amazon Cognito is a powerful tool that enables developers to handle user authentication, authorization, and user management in web and mobile applications. With its support

Read More »
PrintNightmare: The Vulnerability That Shook Windows Systems

PrintNightmare: The Vulnerability That Shook Windows Systems 

October 23, 2023

In recent years, the cybersecurity landscape has been constantly evolving, with new vulnerabilities and exploits emerging on a regular basis. One such vulnerability that made

Read More »
WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security

WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security

October 14, 2023

WebSocket hijacking is a critical security concern in modern web applications. While WebSockets provide efficient and real-time communication between clients and servers, they also introduce

Read More »
How Penetration Testing Helps Healthcare Organizations Defend Against Cyber Threats

How Penetration Testing Protects Healthcare from Cyber Threats

October 13, 2023

Introduction Healthcare organizations that aim to safeguard patient privacy and data must take proactive security steps such as penetration testing – an approach that simulates

Read More »
An In-depth Exploration into WebClient Abuse

An In-depth Exploration into WebClient Abuse

October 9, 2023

In red teaming, understanding the potential for lateral movement within a network is crucial. One method that attackers often use for this purpose is WebClient

Read More »
Dumping Android Application Memory

Dumping Android Application Memory

October 7, 2023

In today’s digital landscape, protecting sensitive information is of utmost importance. As technology progresses, the tactics used by malicious individuals to illicitly access data also

Read More »
Protecting Android Clipboard Content

Protecting Android Clipboard Content

October 3, 2023

In today’s digital landscape, mobile users often rely on the clipboard function to conveniently copy and paste sensitive information like passwords and payment details. However,

Read More »

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • About Us
  • Services
  • Blog
  • Media

Legal

  • Privacy Policy
  • Terms of Service
  • Contact Us

Newsletter

Required Login
Please Login for Submit Form.
Close
Success
Thank you! Form submitted successfully.
Close
This field is required

©️2024 Redfox Cyber Security Inc. All rights reserved.