Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycleâ„¢, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Cloud, VPC, and Internal Networks
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycleâ„¢, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Cloud, VPC, and Internal Networks
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From The Frontlines

  • PSE & Red Team Series: Badge Cloning
    How To | Red Team | Social Engineering

    PSE & Red Team Series: Badge Cloning

    ByNathan Anderson October 21, 2025September 15, 2025

    Lead Penetration Tester Nathan Anderson is back with more PSE and red team advice, this time looking into three tools he uses to clone badges and gain access.

    Read More PSE & Red Team Series: Badge CloningContinue

  • Windows Kills Common Offline/Account-less Install Method
    In The News | Networks

    Windows Kills Common Offline/Account-less Install Method

    ByRyan Chaplin October 17, 2025October 21, 2025

    Microsoft Windows recently announced the removal of local-only installs on Windows 11. Raxis’ Ryan Chaplin looks at concerns and possible options.

    Read More Windows Kills Common Offline/Account-less Install MethodContinue

  • Salesforce Compromise: What You Need to Know
    Exploits | In The News | Phishing | Security Recommendations

    Salesforce Compromise: What You Need to Know

    ByJason Taylor October 15, 2025October 13, 2025

    The FBI has released information to help organizations that are affected by recent attacks against Salesforce. Raxis’ Jason Taylor sums up next steps here.

    Read More Salesforce Compromise: What You Need to KnowContinue

  • SpamGPT: Protecting Your Company From Large-Scale Phishing
    In The News | Phishing | Social Engineering

    SpamGPT: Protecting Your Company From Large-Scale Phishing

    ByNathan Anderson October 9, 2025October 5, 2025

    SpamGPT, a complex phishing and social engineering suite has made the news recently. Learn what it is and how organizations can protect their employees.

    Read More SpamGPT: Protecting Your Company From Large-Scale PhishingContinue

  • Cool Tools Series: Kerbrute
    Exploits | Networks | Penetration Testing | Red Team

    Cool Tools Series: Kerbrute

    ByAndrew Trexler October 7, 2025September 3, 2025

    Raxis Principal Penetration Tester Andrew Trexler walks through the many uses of Kerbrute from user enumeration to brute-forcing and password spraying.

    Read More Cool Tools Series: KerbruteContinue

  • Copilot Coming Soon to a Desktop Near You
    In The News | Security Recommendations

    Microsoft Copilot Coming Soon to a Desktop Near You

    ByJason Taylor October 2, 2025September 18, 2025

    With Microsoft automatically installing Copilot on Windows systems with Microsoft 365 desktop apps installed, organizations will want to set up AI policies.

    Read More Microsoft Copilot Coming Soon to a Desktop Near YouContinue

  • Lateral Movement: From Beachhead to Breach
    Exploits | How To | Networks | Penetration Testing | Security Recommendations

    Lateral Movement: From Beachhead to Breach

    ByNate Jernigan September 23, 2025August 21, 2025

    Raxis Senior Penetration Tester Nate Jernigan discusses lateral movement in penetration testing and the methods and tools he uses when performing these attacks.

    Read More Lateral Movement: From Beachhead to BreachContinue

  • Lessons from the DaVita Healthcare Ransomware Attack
    In The News | Networks | Penetration Testing | Security Recommendations | Social Engineering

    Lessons from the DaVita Healthcare Ransomware Attack

    ByBrian Tant September 18, 2025September 15, 2025

    The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit the impact.

    Read More Lessons from the DaVita Healthcare Ransomware AttackContinue

  • HTTP/1.1 Security News: What You Can Do Now
    Blog | In The News | Web Apps

    HTTP/1.1 Security News: What You Can Do Now

    ByJason Taylor September 16, 2025September 15, 2025

    A recent Portswigger white paper on HTTP/1.1 highlights critical security issues. If you use old products that still require it, here’s what you can do.

    Read More HTTP/1.1 Security News: What You Can Do NowContinue

  • Dev's Fast Reporting of Phish Reduced Impact on Blockchain Malware Attacks
    In The News | Phishing

    Dev’s Fast Reporting of Phish Reduced Impact on Blockchain Malware Attacks

    ByAndrew Trexler September 11, 2025September 9, 2025

    A recent successful phish allowed attackers to run malware targeting cryptocurrency transactions on various blockchains, but fast reporting limited the damage.

    Read More Dev’s Fast Reporting of Phish Reduced Impact on Blockchain Malware AttacksContinue

  • Cool Tools Series: Croc
    How To | Networks

    Cool Tools Series: Croc for Secure Data Exfiltration

    ByNathan Anderson September 9, 2025August 14, 2025

    Lead Penetration Tester Nathan Anderson provides tips on using croc for secure data exfiltration just like he does on red team engagements.

    Read More Cool Tools Series: Croc for Secure Data ExfiltrationContinue

  • Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios
    Exploits | Penetration Testing | Security Recommendations | Web Apps

    Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios

    ByRyan Chaplin August 26, 2025July 11, 2025

    Lead Penetration Tester Ryan Chaplin walks us through 5 real-world attack scenarios used in real-world penetration tests by Raxis.

    Read More Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack ScenariosContinue

Page navigation

1 2 3 … 20 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube