In The News

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as In The News

  • CVE-2025-59886 Eaton Exploit Code Published

    CVE-2025-59886 Eaton Exploit Code Published

    By Jason Taylor With exploit code available for the vulnerabilities in Eaton’s xComfort Ethernet Communication Interface, Jason Taylor recommends replacing or isolating. February 5, 2026
  • Publicly Accessible Database Discovered Hosting 149 Million Credentials

    Publicly Accessible Database Discovered Hosting 149 Million Credentials

    By Andrew Trexler Andrew Trexler looks at a recently discovered public database of stolen usernames and passwords and what you can do now to protect your access and information. February 2, 2026
  • The Growing Threat: Attackers Using GitHub Repositories as Malware Staging Mechanisms

    The Growing Threat: Attackers Using GitHub Repositories as Malware Staging Mechanisms

    By Brian Tant Recent attacks, including GitVenom and Lumma Stealer, underscore the threat of Attackers using GitHub repositories as malware staging mechanisms. January 21, 2026
  • CVE‑2020‑12812 and Why It’s Still an Issue Five Years Later

    CVE‑2020‑12812 and Why It’s Still an Issue Five Years Later

    By Scottie Cole Principal Penetration Tester Scottie Cole explains why Fortinet released a new security advisory about CVE‑2020‑12812 and what your organization should check. January 16, 2026
  • Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password Cracker

    Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password Cracker

    By Brad Herring With the start of 2026, the Raxis team is already busy. A new upgrade to our password-cracking system shows how quickly 8-character passwords can be cracked. January 9, 2026
  • Autonomous Supply-Chain Worm Compromises Postman, PostHog, Zapier and 26k Others

    Autonomous Supply-Chain Worm Compromises Postman, PostHog, Zapier, and 26k Others

    By Ryan Chaplin Operating fully autonomously, this new supply-chain malware has compromised Postman, PostHog, Zapier and 26k others. Learn what your organization should do now. December 10, 2025