Skip to content
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Managed SOC Services
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Managed SOC Services
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
Fox hacker at monitors illustrating SSTI (Server-Side Template Injection)

A Guide to Server-Side Template Injection (SSTI)

July 19, 2024

Web applications often use template engines to dynamically generate web pages by combining static templates with runtime data. While template engines make development faster and

Read More »
Fox in a red hoodie overlooking city lights from a server room, symbolizing buffer overflow vulnerabilities in cybersecurity.

Understanding Buffer Overflow: Protecting Systems from Vulnerabilities

April 19, 2024

Buffer overflow is one of the most persistent and dangerous security threats in computing. It can allow attackers to gain unauthorized access, execute malicious code,

Read More »
A stylized digital artwork of a person in a red hoodie with fox ears and tail, sitting at a desk surrounded by glowing monitors and computer hardware, overlooking a futuristic cityscape through a window. The screens display streams of code, symbolizing cybersecurity or hacking, with the theme “Securing Web Uploads: Extension Denylisting.”

Securing Web Uploads: Extension Denylisting

February 14, 2024

At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of

Read More »
Person in a fox hoodie coding on multiple monitors in a glowing server room, symbolizing I2C communication protocol mastery.

Subdomain Enumeration: Leveraging Web Architecture’s Power

February 8, 2024

Subdomain enumeration is a critical process for researchers, security professionals, and enthusiasts delving into web architecture. By uncovering and mapping subdomains, we can gain invaluable

Read More »
Fox-hooded figure working on a laptop with glowing code, overlooking a futuristic city, symbolizing JWT algorithm confusion risks.

JWT: A Deep Dive into Algorithm Confusion

February 1, 2024

Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are

Read More »
Fox-hooded figure at glowing monitors in a neon-lit cityscape, symbolizing research into XML External Entity (XXE) attack risks.

Understanding XML External Entity Injection (XXE) Attacks

December 14, 2023

XML External Entity Injection (XXE) is a critical web security vulnerability that can expose applications to various risks. In this comprehensive guide, we will delve

Read More »
Fox-hooded figure in a neon-lit server room pointing at a glowing monitor, symbolizing implicit intent exploitation and URL security risks.

Intercepting Implicit Intent to Load Arbitrary URL

December 9, 2023

In the world of Android app development, intents play a crucial role in facilitating communication and interaction between different components within an app and even

Read More »
Fox-hooded figure at glowing monitors in a neon-lit server room, symbolizing web cache poisoning risks and website protection.

Web Cache Poisoning: A Comprehensive Guide to Protecting Your Website 

November 21, 2023

Web cache poisoning is a sophisticated attack. It targets the caching system of a browser, leading to the delivery of stale or outdated content to

Read More »
Fox-hooded figure in a neon-lit server room overlooking a city, symbolizing research into HTTP parameter pollution in web applications.

HTTP Parameter Pollution: Manipulating Web App Vulnerabilities 

October 31, 2023

HTTP Parameter Pollution (HPP) is a cunning technique employed by attackers to manipulate or retrieve hidden information by injecting encoded query string delimiters into existing

Read More »
Fox-hooded figure at multiple glowing monitors in a neon-lit server room, symbolizing security research on Amazon Cognito.

Understanding and Securing Amazon Cognito: A Comprehensive Guide 

October 27, 2023

Amazon Cognito is a powerful tool that enables developers to handle user authentication, authorization, and user management in web and mobile applications. With its support

Read More »
Fox-hooded figure at multiple monitors in a neon-lit server room, symbolizing research into WebSocket hijacking risks and defenses.

WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security

October 14, 2023

WebSocket hijacking is a critical security concern in modern web applications. While WebSockets provide efficient and real-time communication between clients and servers, they also introduce

Read More »
Fox-hooded figure at multiple monitors analyzing mobile memory — metaphor for defensive Android memory forensics and app analysis.

Dumping Android Application Memory

October 7, 2023

In today’s digital landscape, protecting sensitive information is of utmost importance. As technology progresses, the tactics used by malicious individuals to illicitly access data also

Read More »
Page1 Page2 Page3

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • About Us
  • Services
  • Blog
  • Media

Legal

  • Privacy Policy
  • Terms of Service
  • Contact Us

Newsletter

Required Login
Please Login for Submit Form.
Close
Success
Thank you! Form submitted successfully.
Close
This field is required

©️2025 Redfox Cyber Security Inc. All rights reserved.