ServicesAboutApproachBlogContact
// field notes

The Redbird Blog

Offensive research, threat analysis, and war stories from the field. No fluff. No vendor marketing.

Red TeamApr 20268 min read
Bypassing EDR with Indirect Syscalls in 2026

How modern endpoint detection and response products handle userland hooking — and why indirect syscalls remain one of the most reliable bypasses in our toolkit.

Read article →
Threat IntelMar 202612 min read
Tracking APT-X: 18 Months of Silent Reconnaissance

A deep-dive into a previously undocumented threat actor targeting French defence contractors, including full IOC list, C2 infrastructure analysis and MITRE ATT&CK mapping.

Read article →
Web SecurityFeb 20266 min read
GraphQL Batching Attacks: The Forgotten Attack Surface

GraphQL's batching feature is almost universally misconfigured. We walk through how we used it to enumerate users, bypass rate limiting and eventually achieve account takeover.

Read article →