Skip to content
  • Home
  • Origins
  • Services
    • Application Security
      • Web Application Penetration Testing
      • API Penetration Testing
      • Mobile Application Penetration Testing​
      • Source Code Reviews
      • Threat Modeling
      • Architecture Reviews
    • Infrastructure Security
      • Internal Network Penetration Testing
      • External Network Penetration Testing
      • Active Directory Security Assessments
      • Wireless Network Penetration Testing
      • Host Reviews
      • Firewall Configuration Reviews
    • Cloud Security
      • Cloud Configuration Reviews
      • Cloud Penetration Testing
    • Adversary Simulations
      • Red Teaming
      • Purple teaming
      • OSINT
      • Phishing Simulations
    • DevSecOps
      • Container Security
      • Kubernetes configuration reviews
    • Other
      • Managed Vulnerability Scanning
      • PCI DSS Security Assessments
      • Hardware Security Assessments
      • Smart Contracts Security Assessments
  • MSOC
  • Academy
  • Advisory
  • Blog
  • Contact
A Redfox Cybersecurity blog on ulnerabilities in Netgear WNR614 Router​.

Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router​

January 22, 2026

Legacy home and SOHO routers remain attractive targets for attackers. They sit at the network edge, handle all inbound/outbound traffic, and often expose a browser-based

Read More »
A blog on Security Advisory: Multiple Vulnerabilities in Syrotech Router

Security Advisory: Multiple Vulnerabilities in Syrotech Router 

August 1, 2024

Overview: Our security research has uncovered multiple high-risk vulnerabilities in the Syrotech SY-GPON-1110-WDONT router. These issues pose serious risks, including unauthorized access, data exposure, and

Read More »
A blog on Assembly Language programming

Introduction To Assembly Language

July 23, 2024

Assembly language programming is a fascinating discipline that allows developers to interact directly with a computer’s hardware. This guide introduces you to the fundamentals of

Read More »
A blog from Redfox Cybersecurity on Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326​

Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326​

July 23, 2024

A critical privilege escalation vulnerability (CVE-2024-28326) has been identified in the Asus RT-N12+ B1 router. The device exposes an unrestricted root terminal via its UART

Read More »
A blog from Redfox Cybersecurity on Hardware Hacking

Getting Started with Hardware Hacking

June 15, 2024

Ever been curious about hardware hacking but didn’t know where to begin? You’re not alone. At first glance, hardware hacking and reverse engineering can feel

Read More »
A blog from Redfox Cybersecurity on Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module

Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module

June 15, 2024

Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module Firmware customization has become a core skill in hardware hacking and cybersecurity research. With the

Read More »
A blog from redfox Cybersecurity on using the EXPLIoT framework for Exploiting and Securing IoT Devices

EXPLIoT: A Framework For Exploiting And Securing IoT Devices

June 14, 2024

EXPLIoT: A Framework for Exploiting and Securing IoT Devices Smart devices have become part of our daily lives – helping us save time, automate tasks,

Read More »
A blog from Redfox Cybersecurity on Nabhyaan Drone and the security risks it faces.

Flying Secure- A Comprehensive Guide to the Nabhyaan Drone

June 14, 2024

Drones are no longer just hobby gadgets—they’ve become critical assets across industries like agriculture, surveillance, defense, and logistics. The Nabhyaan Drone, with its advanced design

Read More »
Redfox Cybersecurity blog on Vulnerabilities in LB-link BL-W1210M Router ​

Security Advisory – Multiple Vulnerabilities in LB-link BL-W1210M Router ​

June 13, 2024

Routers form the backbone of modern digital infrastructure, enabling connectivity for homes, businesses, and entire networks. However, when vulnerabilities exist in these devices, they can

Read More »
A blog from Redfox Cybersecurity explaining car Hacking and industry and users can reduce risk.

Car Hacking-  The New Frontier In Cybersecurity

June 10, 2024

Car Hacking- The New Frontier In Cybersecurity As cars transform into rolling computers, they bring not just convenience—but also new risks. Modern vehicles are no

Read More »
A Redfox Cybersecurity blog on ulnerabilities in Netgear WNR614 Router​.

Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router​

June 6, 2024

Legacy home and SOHO routers remain attractive targets for attackers. They sit at the network edge, handle all inbound/outbound traffic, and often expose a browser-based

Read More »
A Redfox Cybersecurity blog on Digisol DG-GR1321

Digisol DG-GR1321: Plaintext Password Storage Vulnerability (CVE-2024-4232)

May 24, 2024

Digisol DG-GR1321: Plaintext Password Storage Vulnerability (CVE-2024-4232) Password security is one of the most fundamental pillars of protecting digital systems. Whether it’s a personal device,

Read More »
Page1 Page2 Page3

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • Origins
  • Services
  • Blog

Legal

  • Privacy Policy
  • Terms of Service
  • Contact

Newsletter

Required Login
Please Login for Submit Form.
Close
Success

Thank you! Form submitted successfully.

This field is required

© 2026 Redfox Cyber Security Inc. All rights reserved.