Skip to content
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us

Digisol DG GR1321’s Password Storage in Plaintext CVE-2024-4232​

May 24, 2024

Password storage is the practice of securely saving user passwords in a way that prevents unauthorized access and protects against potential security breaches. The Digisol

Read More »

Digisol DG GR1321’s Improper Access Control CVE-2024-4231​

May 24, 2024

The Improper Access Control vulnerability is present in the Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version: v3.2.02) due to the absence of proper access control

Read More »

Digisol DG GR1321’s Password Policy Bypass CVE-2024-2257​

May 22, 2024

The Password Policy Bypass Vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version: v3.2.02) due to improper implementation of password policies. An attacker

Read More »

Asus RT-N12+ B1’s Credentials Stored in Cleartext – CVE‐2024‐28325

May 15, 2024

A vulnerability has been identified in the Asus RT-N12+ B1, specifically related to how the router stores its sensitive information (passwords) in cleartext in its

Read More »

Asus RT N12 + B1’s Insecure Credential Storage CVE-2024-28327

May 15, 2024

A vulnerability has been identified in the Asus RT-N12+ B1, specifically related to how the router stores its sensitive information (passwords) in cleartext in its

Read More »

Asus RT N12 + B1’s CSV Injection CVE-2024-28328​

May 7, 2024

A vulnerability has been uncovered in the Asus RT N12+ B1 router, specifically related to CSV Injection. This flaw poses a significant threat to device

Read More »

Tenda N300 F3 Router Password Policy Bypass Vulnerability

April 22, 2024

In January 2024, while conducting security assessments, our team stumbled upon a critical vulnerability in the Tenda N300 F3 Router. Recognizing the potential impact on

Read More »
Master Wi-Fi Connectivity with NodeMCU

Master Wi-Fi Connectivity with NodeMCU: Unleashing the Power of Wi-Fi Wizardry

April 10, 2024

Wi-Fi connectivity has become an integral component of modern life, offering wireless Internet access on various devices. Understanding its fundamental workings is key to optimizing

Read More »
Identifying Unlabelled UART Pins

Decoding the Mystery: Identifying Unlabelled UART Pins

February 19, 2024

Electronics can be a challenging world, especially when working with UARTs, which makes understanding its inner workings essential. Unlabeled UART pins can present both beginners

Read More »
Decoding I2C Mastering the Communication Protocol

Decoding I2C: Mastering the Communication Protocol

February 12, 2024

In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated Circuit) protocol, revolutionizing inter-device communication in electronic devices. With just two wires,

Read More »
Unveiling SWD Attack Surface

Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware

February 2, 2024

SWD stands as one of the lesser-noticed vulnerabilities of hardware security. Used for debugging and programming embedded systems, SWD allows developers to communicate directly with

Read More »
Decoding JTAG: Unveiling and Validating Headers on Your Device

Decoding JTAG: Unveiling and Validating Headers on Your Device

January 25, 2024

JTAG headers play an essential role in embedded systems development, allowing developers and engineers to access low-level parts of devices for debugging and testing purposes.

Read More »
Page1 Page2 Page3 Page4

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • About Us
  • Services
  • Blog
  • Media

Legal

  • Privacy Policy
  • Terms of Service
  • Contact Us

Newsletter

Required Login
Please Login for Submit Form.
Close
Success
Thank you! Form submitted successfully.
Close
This field is required

©️2024 Redfox Cyber Security Inc. All rights reserved.