Skip to content
  • Home
  • Origins
  • Services
    • Application Security
      • Web Application Penetration Testing
      • API Penetration Testing
      • Mobile Application Penetration Testing​
      • Source Code Reviews
      • Threat Modeling
      • Architecture Reviews
    • Infrastructure Security
      • Internal Network Penetration Testing
      • External Network Penetration Testing
      • Active Directory Security Assessments
      • Wireless Network Penetration Testing
      • Host Reviews
      • Firewall Configuration Reviews
    • Cloud Security
      • Cloud Configuration Reviews
      • Cloud Penetration Testing
    • Adversary Simulations
      • Red Teaming
      • Purple teaming
      • OSINT
      • Phishing Simulations
    • DevSecOps
      • Container Security
      • Kubernetes configuration reviews
    • Other
      • Managed Vulnerability Scanning
      • PCI DSS Security Assessments
      • Hardware Security Assessments
      • Smart Contracts Security Assessments
  • Managed SOC
  • Academy
  • Advisory
  • Blog
  • Contact
Fox in a red hoodie at dual monitors in a server room, symbolizing Digisol DG-GR1321 password policy bypass vulnerability CVE-2024-2257.

Digisol DG-GR1321 Password Policy Bypass Vulnerability (CVE-2024-2257)​

May 22, 2024

A critical security flaw has been identified in the Digisol DG-GR1321 router (Hardware version: 3.7L; Firmware version: v3.2.02). The issue arises from the router’s improper

Read More »
Fox hacker in red hoodie at monitors symbolizing Asus RT-N12/B1 privilege escalation (CVE-2024-28326)

Asus RT-N12+ B1’s Credentials Stored in Cleartext – CVE‐2024‐28325

May 15, 2024

Ensuring the security of networking devices is more critical than ever in today’s connected world. Routers, often overlooked, are the gateways to our homes and

Read More »
Fox in red hoodie at glowing monitors with city lights, symbolizing Asus RT-N12+ B1 insecure credential storage flaw CVE-2024-28327.

Asus RT N12 + B1’s Insecure Credential Storage CVE-2024-28327

May 15, 2024

In today’s connected world, routers act as the first line of defense for both home and business networks. When vulnerabilities are discovered in these devices,

Read More »
Fox in a red hoodie at a multi-monitor workstation, illustrating Asus RT-N12/B1 CSV injection vulnerability (CVE-2024-28328).

Asus RT N12 + B1’s CSV Injection CVE-2024-28328​

May 7, 2024

Routers form the backbone of modern digital connectivity, acting as critical gateways between private networks and the internet. When vulnerabilities are discovered in these devices,

Read More »
Fox in a red hoodie at multiple monitors in a neon server room, symbolizing the Tenda N300 F3 router password policy bypass vulnerability.

Tenda N300 F3 Router Password Policy Bypass Vulnerability

April 22, 2024

In January 2024, during one of our scheduled security assessments, our team identified a critical vulnerability affecting the Tenda N300 F3 Router. As this device

Read More »
Fox in a red hoodie surrounded by glowing servers overlooking city lights, symbolizing NodeMCU Wi-Fi connectivity wizardry.

Master Wi-Fi Connectivity With NodeMCU: Unleashing The Power Of Wi-Fi Wizardry

April 10, 2024

Wi-Fi is no longer a luxury—it’s the backbone of our modern, connected world. From smartphones and laptops to smart appliances and IoT devices, almost every

Read More »

Decoding the Mystery: Identifying Unlabelled UART Pins

February 19, 2024

Electronics can be a challenging world, especially when working with UARTs, which makes understanding its inner workings essential. Unlabeled UART pins can present both beginners

Read More »

Decoding I2C: Mastering the Communication Protocol

February 12, 2024

In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated Circuit) protocol, revolutionizing inter-device communication in electronic devices. With just two wires,

Read More »
Figure in a fox hoodie at glowing monitors overlooking a cityscape, symbolizing analysis of SWD hardware attack surfaces.

Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware

February 2, 2024

SWD stands as one of the lesser-noticed vulnerabilities of hardware security. Used for debugging and programming embedded systems, SWD allows developers to communicate directly with

Read More »
Fox-hooded figure in a server room, surrounded by monitors and cables, overlooking a city—metaphor for hardware hacking in IoT research.

Decoding JTAG: Unveiling and Validating Headers on Your Device

January 25, 2024

JTAG headers play an essential role in embedded systems development, allowing developers and engineers to access low-level parts of devices for debugging and testing purposes.

Read More »
Fox in a red hoodie surrounded by racks and a laptop, overlooking a neon city — evoking hardware hacking and IoT security research.

Hardware Hacking for IoT Devices – Offensive IoT Exploitation

January 20, 2024

In the world of smart devices, IoT devices are becoming more vulnerable to attacks. Hardware hacking is a technique used to exploit IoT devices at the

Read More »

JTAG Security: Unlocking the Potential of Hardware Hacking

January 18, 2024

With this comprehensive guide, we aim to demonstrate how the Joint Test Action Group (JTAG) interface can provide hardware security. Created during the 1980s by

Read More »
Page1 Page2 Page3

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • Origins
  • Services
  • Blog

Legal

  • Privacy Policy
  • Terms of Service
  • Contact

Newsletter

Required Login
Please Login for Submit Form.
Close
Success

Thank you! Form submitted successfully.

This field is required

© 2025 Redfox Cyber Security Inc. All rights reserved.