Raxis Blog Posts By Author
-
Cool Tools Series: NMAP for Penetration TestsRaxis’ lead developer, Adam Fernandez, adds to our Cool Tools Series with a focus on Nmap: discovering live hosts that appear to be down and useful NSE scripts.
-
OWASP Top 10: The Bedrock of an Application Penetration TestWhen performing web app, mobile app, and API penetration tests, we refer to the OWASP Top 10. Here we’ll discuss what that means and why it’s helpful.
-
Meet the Team: Adam Fernandez, Lead DeveloperAdam Fernandez has been a Raxis team member since 2017, an inventor since high school, and a security guy since birth. (Well, almost). Read about his amazing path to our company.
-
Realistically Assessing the Threat of Clickjacking TodayRaxis’ Lead Developer Adam Fernandez discusses clickjacking, explaining what it is and why it represents less of a threat now than it once did. Adam also talks about how clickjacking differs from similar attacks.
-
So, I Hacked a Tesla . . .Tesla is leading the way in electric vehicle adoption. But the company has a few more miles to go with its cybersecurity safeguards.
Raxis Attack
Continuous, expert-led PTaaS combined with advanced automation to uncover and address hidden vulnerabilities, ensuring your business stays ahead of evolving cyber threats while maintaining regulatory compliance.
Raxis Protect
Continuous vulnerability scanning, real-time asset management, and expert guidance to proactively identify and address security gaps across your entire digital ecosystem, ensuring 24/7 protection against evolving cyber threats.
Raxis Strike
Tailored, expert-led penetration testing that uncovers hidden vulnerabilities using real-world hacker techniques, providing actionable insights to strengthen your defenses and protect against sophisticated cyber threats.
Partner With Raxis
Partnering with Raxis empowers your business with elite penetration testing services, competitive reseller pricing, and recurring revenue opportunities, all backed by a proven track record of excellence and a commitment to staying ahead of evolving cybersecurity threats.