Blog

Home / Blog

A Redfox Cybersecurity blog explaining BEFF(Browser Exploitation Framework) Framework

Intro to BEFF Framework

Hey everyone, in this blog, we will be discussing about BeEF, which is short for The Browser Exploitation Framework, and some attacks that can be

Read More »
A Redfox Cybersecurity blog on server-side request forgery.

Server-Side Request Forgery

SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target

Read More »
A Redfox Cybersecurity blog on No SQL Injection

No SQL Injection

NoSQL Injection refers to cyber-attacks that inject malicious payloads into non-SQL databases like MongoDB. Due to the new demand for modern-day applications, there has been

Read More »
Part one of the three parter blog series on hacking GraphQL from Redfox Cybersecurity

Hacking GraphQL Part 1

GraphQL is quickly becoming the alternative to REST API, being able to request a specified set of data across multiple resources within a single request.

Read More »