Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • Smart phone with security alert
    Exploits

    Imminent Threat for US Hospitals and Clinics, RYUK Ransomware Alert (AA20-302A) – Updated 11/2/2020

    ByBrian Tant October 29, 2020August 22, 2025

    A new nationwide cyberattack appears to be targeted at U.S. based hospitals, clinics, and other health care facilities. Healthcare on heightened alert.

    Read More Imminent Threat for US Hospitals and Clinics, RYUK Ransomware Alert (AA20-302A) – Updated 11/2/2020Continue

  • Tailgating into stairwell
    Exploits

    Why Tailgating is an Effective Hacker Tactic

    ByBonnie Smyre October 9, 2020July 28, 2025

    We’re conditioned to be helpful and accommodating. That’s why tailgating works so well for hackers. The Raxis penetration testing team shows how.

    Read More Why Tailgating is an Effective Hacker TacticContinue

  • Broadcast Poisoning
    Exploits | How To | Security Recommendations

    AttackTek: How to Launch a Broadcast Resolution Poisoning and SMB Relay Attack

    ByRaxis Research Team September 25, 2020July 28, 2025

    Learn an easy, effective way to test corporate networks with broadcast poisoning and SMB relay attacks used in tandem from the Raxis penetration testing team.

    Read More AttackTek: How to Launch a Broadcast Resolution Poisoning and SMB Relay AttackContinue

  • Raxis CTO, Brian Tant
    Password Cracking | Security Recommendations

    Understanding the Why Behind Password Management

    ByBonnie Smyre July 10, 2020

    In this video, Raxis CTO Brian Tant explains why password mismanagement is still one of the most reliable ways to breach a company network and what you can do to secure your network.

    Read More Understanding the Why Behind Password ManagementContinue

  • Raxis CTO, Brian Tant
    Password Cracking | Patching | Security Recommendations | Social Engineering

    3 Steps You Should Take Right Now to Reduce Your Risk of a Cyberattack

    ByBrian Tant June 22, 2020July 28, 2025

    In this video, Raxis CTO Brian Tant talks about three steps you should take to secure your network against hackers.

    Read More 3 Steps You Should Take Right Now to Reduce Your Risk of a CyberattackContinue

  • The following is a reenactment of a typical physical security assessment performed by a professional Raxis security engineer
    Exploits | Penetration Testing | Security Recommendations

    Here’s How Hackers Can Get Through Your Doors and Onto Your Network

    ByBrian Tant June 12, 2020July 28, 2025

    Just a guy who left something at work and had to run back in? But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started.

    Read More Here’s How Hackers Can Get Through Your Doors and Onto Your NetworkContinue

  • Canned air attack
    Exploits | Penetration Testing | Security Recommendations

    Can This Simple Trick Outwit Your Smart Security?

    ByBrad Herring June 5, 2020

    Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself.

    Read More Can This Simple Trick Outwit Your Smart Security?Continue

  • Hand using plastic card to open a locked door
    Exploits | In The News | Patching | Security Recommendations

    Windows 10 Vulnerability Highlights Need for Physical Security Testing

    ByRaxis Research Team May 28, 2020July 28, 2025

    A Windows 10 security problem offers an excellent example of what can happen when a bad guy gets to spend a few minutes alone with your computer.

    Read More Windows 10 Vulnerability Highlights Need for Physical Security TestingContinue

  • Scientist putting a specimen in a test tube
    Exploits | In The News | Security Recommendations

    Pharma Breaches and the Terrifying Prospect of Data Manipulation

    ByBrian Tant May 14, 2020July 28, 2025

    Raxis CTO Brian Tant shares his thoughts on cybersecurity threats to the pharma industry and what pharma companies can do to protect themselves.

    Read More Pharma Breaches and the Terrifying Prospect of Data ManipulationContinue

  • IKE VPNs Supporting Aggressive Mode
    Exploits | How To | Password Cracking

    IKE VPNs Supporting Aggressive Mode

    ByBonnie Smyre May 23, 2018

    In this post we’ll look at why IKE VPNs with Aggressive Mode enabled continue to be a vulnerability, how it can be exploited, and how to mitigate this risk.

    Read More IKE VPNs Supporting Aggressive ModeContinue

  • Web Attacks: Insecure Transmission of Data
    Exploits | Web Apps

    Web Attacks: Insecure Transmission of Data

    ByBonnie Smyre April 26, 2018June 3, 2025

    Raxis COO Bonnie Smyre discusses the vulnerabilities that arise when web apps transmit data insecurely and what you can do to secure your apps.

    Read More Web Attacks: Insecure Transmission of DataContinue

  • Web Attacks: Clickjacking
    Exploits | Web Apps

    Web Attacks: Clickjacking

    ByBonnie Smyre April 19, 2018January 17, 2025

    Many of the external network and web application penetration tests that we perform list ‘clickjacking’ as a vulnerability. Here Raxis COO Bonnie Smyre explains what clickjacking is and how you can protect against it.

    Read More Web Attacks: ClickjackingContinue

Page navigation

Previous PagePrevious 1 … 3 4 5 6 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube