Skip to content
  • Home
  • Origins
  • Services
    • Application Security
      • Web Application Penetration Testing
      • API Penetration Testing
      • Mobile Application Penetration Testing​
      • Source Code Reviews
      • Threat Modeling
      • Architecture Reviews
    • Infrastructure Security
      • Internal Network Penetration Testing
      • External Network Penetration Testing
      • Active Directory Security Assessments
      • Wireless Network Penetration Testing
      • Host Reviews
      • Firewall Configuration Reviews
    • Cloud Security
      • Cloud Configuration Reviews
      • Cloud Penetration Testing
    • Adversary Simulations
      • Red Teaming
      • Purple teaming
      • OSINT
      • Phishing Simulations
    • DevSecOps
      • Container Security
      • Kubernetes configuration reviews
    • Other
      • Managed Vulnerability Scanning
      • PCI DSS Security Assessments
      • Hardware Security Assessments
      • Smart Contracts Security Assessments
  • MSOC
  • Academy
  • Advisory
  • Blog
  • Contact
A blog from Redfox Cybersecurity on Process Injection

Process Injection: Harnessing The Power (Responsibly)

February 22, 2024

Process Injection Process injection is an advanced penetration testing technique used by experienced penetration testers to introduce malicious code into non-malicious processes, infiltrating stealthily without

Read More »
A blog from Redfox Cybersecurity on Fundamentals of Rust Programming

Decoding the Mystery: Identifying Unlabelled UART Pins

February 19, 2024

Electronics can be a challenging world, especially when working with UARTs, which makes understanding its inner workings essential. Unlabeled UART pins can present both beginners

Read More »

Securing Web Uploads: Extension Denylisting

February 14, 2024

At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of

Read More »

Decoding I2C: Mastering the Communication Protocol

February 12, 2024

In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated Circuit) protocol, revolutionizing inter-device communication in electronic devices. With just two wires,

Read More »
A blog from Redfox Cybersecurity on Fundamentals of Rust Programming

Exploring the Fundamentals of Rust Programming

February 7, 2024

Rust is an efficient systems programming language designed by Mozilla that stands out for its exceptional efficiency, strong memory safety guarantees, high-performance capabilities, and strong

Read More »
A Redfox Cybersecurity blog on SWD Attack Surface in Hardware

Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware

February 2, 2024

SWD stands as one of the lesser-noticed vulnerabilities of hardware security. Used for debugging and programming embedded systems, SWD allows developers to communicate directly with

Read More »
A blog from Redfox Cybersecurity on JSON Web Tokens (JWTs)

JWT: A Deep Dive into Algorithm Confusion

February 1, 2024

Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are

Read More »

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • Origins
  • Services
  • Blog

Legal

  • Privacy Policy
  • Terms of Service
  • Contact

Newsletter

Required Login
Please Login for Submit Form.
Close
Success

Thank you! Form submitted successfully.

This field is required

© 2026 Redfox Cyber Security Inc. All rights reserved.