Skip to content
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us

A Guide to Server-Side Template Injection (SSTI)

July 19, 2024

Server-side template Injection (SSTI) occurs when an attacker injects a malicious payload into a template using native template syntax and causes it to execute on

Read More »

Understanding Buffer Overflow: Protecting Systems from Vulnerabilities

April 19, 2024

Introduction to Buffer Overflow Buffer overflow is an alarming security threat that could allow attackers to gain unauthorized access or execute malicious code in an attack environment.

Read More »
Securing Web Uploads

Securing Web Uploads: Extension Denylisting

February 14, 2024

At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of

Read More »
Subdomain Enumeration 2

Subdomain Enumeration: Leveraging Web Architecture’s Power

February 8, 2024

Subdomain enumeration is a critical process for researchers, security professionals, and enthusiasts delving into web architecture. By uncovering and mapping subdomains, we can gain invaluable

Read More »
JWT

JWT: A Deep Dive into Algorithm Confusion

February 1, 2024

Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are

Read More »
Understanding XML External Entity Injection (XXE) Attacks

Understanding XML External Entity Injection (XXE) Attacks

December 14, 2023

XML External Entity Injection (XXE) is a critical web security vulnerability that can expose applications to various risks. In this comprehensive guide, we will delve

Read More »
Intercepting Implicit Intent to Load Arbitrary URL

Intercepting Implicit Intent to Load Arbitrary URL

December 9, 2023

In the world of Android app development, intents play a crucial role in facilitating communication and interaction between different components within an app and even

Read More »
Web Cache Poisoning: A Comprehensive Guide to Protecting Your Website

Web Cache Poisoning: A Comprehensive Guide to Protecting Your Website 

November 21, 2023

Web cache poisoning is a sophisticated attack. It targets the caching system of a browser, leading to the delivery of stale or outdated content to

Read More »
HTTP Parameter Pollution: Manipulating Web App Vulnerabilities

HTTP Parameter Pollution: Manipulating Web App Vulnerabilities 

October 31, 2023

HTTP Parameter Pollution (HPP) is a cunning technique employed by attackers to manipulate or retrieve hidden information by injecting encoded query string delimiters into existing

Read More »
Understanding and Securing Amazon Cognito: A Comprehensive Guide

Understanding and Securing Amazon Cognito: A Comprehensive Guide 

October 27, 2023

Amazon Cognito is a powerful tool that enables developers to handle user authentication, authorization, and user management in web and mobile applications. With its support

Read More »
WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security

WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security

October 14, 2023

WebSocket hijacking is a critical security concern in modern web applications. While WebSockets provide efficient and real-time communication between clients and servers, they also introduce

Read More »
Dumping Android Application Memory

Dumping Android Application Memory

October 7, 2023

In today’s digital landscape, protecting sensitive information is of utmost importance. As technology progresses, the tactics used by malicious individuals to illicitly access data also

Read More »
Page1 Page2 Page3

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • About Us
  • Services
  • Blog
  • Media

Legal

  • Privacy Policy
  • Terms of Service
  • Contact Us

Newsletter

Required Login
Please Login for Submit Form.
Close
Success
Thank you! Form submitted successfully.
Close
This field is required

©️2024 Redfox Cyber Security Inc. All rights reserved.