Raxis Blog Posts by Category

  • Tailgating into stairwell
    Why Tailgating is an Effective Hacker Tactic
    We’re conditioned to be helpful and accommodating. That’s why tailgating works so well for hackers.
  • Broadcast Poisoning
    AttackTek: How to Launch a Broadcast Resolution Poisoning and SMB Relay Attack
    An easy, effective way to test corporate networks is with broadcast poisoning and SMB relay attacks used in tandem. Scott Sailors shows us how.
  • Raxis CTO, Brian Tant
    Understanding the Why Behind Password Management
    In this video, Raxis CTO Brian Tant explains why password mismanagement is still one of the most reliable ways to breach a company network and what you can do to secure your network.
  • Raxis CTO, Brian Tant
    3 Steps You Should Take Right Now to Reduce Your Risk of a Cyberattack
    In this video, Raxis CTO Brian Tant talks about three steps you should take to secure your network against hackers.
  • The following is a reenactment of a typical physical security assessment performed by a professional Raxis security engineer
    Here’s How Hackers Can Get Through Your Doors and Onto Your Network
    This video shows how easy it can be to bypass your company’s sophisticated security system. You might assume I’m just a guy who left something at work and had to run back in. But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started.
  • Canned air attack
    Can This Simple Trick Outwit Your Smart Security?
    Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself.
  • Hand using plastic card to open a locked door
    Windows 10 Vulnerability Highlights Need for Physical Security Testing
    A Windows 10 security problem offers an excellent example of what can happen when a bad guy gets to spend a few minutes alone with your computer.
  • IKE VPNs Supporting Aggressive Mode
    IKE VPNs Supporting Aggressive Mode
    In this post we’ll look at why IKE VPNs with Aggressive Mode enabled continue to be a vulnerability, how it can be exploited, and how to mitigate this risk.
  • Aerial Drones - A New Frontier for Hackers?
    Aerial Drones – A New Frontier for Hackers
    Raxis VP of Business Development discusses how aerial drones, which are now prevalent, can be used in attacks on your security and what you can do to protect your company.