Skip to content
  • Home
  • Origins
  • Services
    • Application Security
      • Web Application Penetration Testing
      • API Penetration Testing
      • Mobile Application Penetration Testing​
      • Source Code Reviews
      • Threat Modeling
      • Architecture Reviews
    • Infrastructure Security
      • Internal Network Penetration Testing
      • External Network Penetration Testing
      • Active Directory Security Assessments
      • Wireless Network Penetration Testing
      • Host Reviews
      • Firewall Configuration Reviews
    • Cloud Security
      • Cloud Configuration Reviews
      • Cloud Penetration Testing
    • Adversary Simulations
      • Red Teaming
      • Purple teaming
      • OSINT
      • Phishing Simulations
    • DevSecOps
      • Container Security
      • Kubernetes configuration reviews
    • Other
      • Managed Vulnerability Scanning
      • PCI DSS Security Assessments
      • Hardware Security Assessments
      • Smart Contracts Security Assessments
  • MSOC
  • Academy
  • Advisory
  • Blog
  • Contact
A blog from Redfox Cybersecurity on A Guide to Server-Side Template Injection (SSTI)

A Guide to Server-Side Template Injection (SSTI)

July 19, 2024

Web applications often use template engines to dynamically generate web pages by combining static templates with runtime data. While template engines make development faster and

Read More »
A blog from Redfox Cybersecurity on Buffer Overflow

Understanding Buffer Overflow: Protecting Systems from Vulnerabilities

April 19, 2024

Buffer overflow is one of the most persistent and dangerous security threats in computing. It can allow attackers to gain unauthorized access, execute malicious code,

Read More »
A blog from Redfox Cybersecurity on JSON Web Tokens (JWTs)

JWT: A Deep Dive into Algorithm Confusion

February 1, 2024

Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are

Read More »
A Redfox Cybersecurity blog explianing XML External Entity Injection (XXE) attacks.

Understanding XML External Entity Injection (XXE) Attacks

December 14, 2023

XML External Entity Injection (XXE) is a critical web security vulnerability that can expose applications to various risks. In this comprehensive guide, we will delve

Read More »
A Redfox Cybersecurity blog on how intents play a crucial role in facilitating communication and interaction between different components within an app and even between different apps.

Intercepting Implicit Intent to Load Arbitrary URL

December 9, 2023

In the world of Android app development, intents play a crucial role in facilitating communication and interaction between different components within an app and even

Read More »
Web Cache Poisoning blog from Redfox Cybersecurity

Web Cache Poisoning: A Comprehensive Guide to Protecting Your Website 

November 21, 2023

Web cache poisoning is a sophisticated attack. It targets the caching system of a browser, leading to the delivery of stale or outdated content to

Read More »
A Redfox Cybersecurity blog exploring the concept of weak ACLs on certificate templates and demonstrate how attackers can exploit them to gain unauthorized privileges.

HTTP Parameter Pollution: Manipulating Web App Vulnerabilities 

October 31, 2023

HTTP Parameter Pollution (HPP) is a cunning technique employed by attackers to manipulate or retrieve hidden information by injecting encoded query string delimiters into existing

Read More »
A blog from redfox Cybersecurity on securing Amazon Cognito

Understanding and Securing Amazon Cognito: A Comprehensive Guide 

October 27, 2023

Amazon Cognito is a powerful tool that enables developers to handle user authentication, authorization, and user management in web and mobile applications. With its support

Read More »
A Redfox Cybersecurity blog on WebSocket Hijacking

WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security

October 14, 2023

WebSocket hijacking is a critical security concern in modern web applications. While WebSockets provide efficient and real-time communication between clients and servers, they also introduce

Read More »
A Redfox Cybersecurity blog exploring the process of dumping Android application memory

Dumping Android Application Memory

October 7, 2023

In today’s digital landscape, protecting sensitive information is of utmost importance. As technology progresses, the tactics used by malicious individuals to illicitly access data also

Read More »
A Redfox Cybersecurity blog exploring understand the probable risks associated with the Android clipboard and implement effective measures to protect your information.

Protecting Android Clipboard Content

October 3, 2023

In today’s digital landscape, mobile users often rely on the clipboard function to conveniently copy and paste sensitive information like passwords and payment details. However,

Read More »
A redfox Cybersecurity blog on File Upload Vulnerabilities.

Understanding File Upload Vulnerabilities

September 15, 2023

In the digital world, the practice of uploading files is a fundamental functionality across numerous websites and applications. This article delves into the realm of

Read More »
Page1 Page2 Page3

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • Origins
  • Services
  • Blog

Legal

  • Privacy Policy
  • Terms of Service
  • Contact

Newsletter

Required Login
Please Login for Submit Form.
Close
Success

Thank you! Form submitted successfully.

This field is required

© 2026 Redfox Cyber Security Inc. All rights reserved.