Skip to content
  • Home
  • Origins
  • Services
    • Application Security
      • Web Application Penetration Testing
      • API Penetration Testing
      • Mobile Application Penetration Testing​
      • Source Code Reviews
      • Threat Modeling
      • Architecture Reviews
    • Infrastructure Security
      • Internal Network Penetration Testing
      • External Network Penetration Testing
      • Active Directory Security Assessments
      • Wireless Network Penetration Testing
      • Host Reviews
      • Firewall Configuration Reviews
    • Cloud Security
      • Cloud Configuration Reviews
      • Cloud Penetration Testing
    • Adversary Simulations
      • Red Teaming
      • Purple teaming
      • OSINT
      • Phishing Simulations
    • DevSecOps
      • Container Security
      • Kubernetes configuration reviews
    • Other
      • Managed Vulnerability Scanning
      • PCI DSS Security Assessments
      • Hardware Security Assessments
      • Smart Contracts Security Assessments
  • Managed SOC
  • Academy
  • Advisory
  • Blog
  • Contact
Fox-hooded figure in a neon-lit server room overlooking a city, symbolizing research into HTTP parameter pollution in web applications.

HTTP Parameter Pollution: Manipulating Web App Vulnerabilities 

October 31, 2023

HTTP Parameter Pollution (HPP) is a cunning technique employed by attackers to manipulate or retrieve hidden information by injecting encoded query string delimiters into existing

Read More »
Fox-hooded figure at multiple glowing monitors in a neon-lit server room, symbolizing deep research into Azure AD security practices.

Unlocking Azure AD Security Secrets: A Comprehensive Guide

October 30, 2023

In this blog, we will discuss Azure AD, Fundamentals of penetration testing, key security features of Azure AD for pen testing, steps that will help

Read More »
Fox-hooded figure at multiple glowing monitors in a neon-lit server room, symbolizing security research on Amazon Cognito.

Understanding and Securing Amazon Cognito: A Comprehensive Guide 

October 27, 2023

Amazon Cognito is a powerful tool that enables developers to handle user authentication, authorization, and user management in web and mobile applications. With its support

Read More »
Fox-hooded figure in neon-lit server room, analyzing code on glowing monitors, symbolizing the PrintNightmare Windows vulnerability.

PrintNightmare: The Vulnerability That Shook Windows Systems 

October 23, 2023

In recent years, the cybersecurity landscape has been constantly evolving, with new vulnerabilities and exploits emerging on a regular basis. One such vulnerability that made

Read More »
Fox-hooded figure at multiple monitors in a neon-lit server room, symbolizing research into WebSocket hijacking risks and defenses.

WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security

October 14, 2023

WebSocket hijacking is a critical security concern in modern web applications. While WebSockets provide efficient and real-time communication between clients and servers, they also introduce

Read More »
Fox-hooded figure at multiple monitors in a neon-lit server room, symbolizing penetration testing for safeguarding healthcare systems.

How Penetration Testing Protects Healthcare from Cyber Threats

October 13, 2023

Introduction Healthcare organizations that aim to safeguard patient privacy and data must take proactive security steps such as penetration testing – an approach that simulates

Read More »
Fox-hooded figure at glowing monitors in a neon server room, symbolizing research into WebClient abuse and defensive controls.

An In-depth Exploration into WebClient Abuse

October 9, 2023

In red teaming, understanding the potential for lateral movement within a network is crucial. One method that attackers often use for this purpose is WebClient

Read More »
Fox-hooded figure at multiple monitors analyzing mobile memory — metaphor for defensive Android memory forensics and app analysis.

Dumping Android Application Memory

October 7, 2023

In today’s digital landscape, protecting sensitive information is of utmost importance. As technology progresses, the tactics used by malicious individuals to illicitly access data also

Read More »
Fox-hooded figure analyzing glowing monitors in a neon-lit server room, symbolizing Android clipboard security and data protection.

Protecting Android Clipboard Content

October 3, 2023

In today’s digital landscape, mobile users often rely on the clipboard function to conveniently copy and paste sensitive information like passwords and payment details. However,

Read More »

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • Origins
  • Services
  • Blog

Legal

  • Privacy Policy
  • Terms of Service
  • Contact

Newsletter

Required Login
Please Login for Submit Form.
Close
Success

Thank you! Form submitted successfully.

This field is required

© 2025 Redfox Cyber Security Inc. All rights reserved.