Penetration Testing

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Penetration Testing

  • Lessons from the DaVita Healthcare Ransomware Attack

    Lessons from the DaVita Healthcare Ransomware Attack

    By Brian Tant The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit the impact. September 18, 2025
  • Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios

    Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios

    By Ryan Chaplin Lead Penetration Tester Ryan Chaplin walks us through 5 real-world attack scenarios used in real-world penetration tests by Raxis. August 26, 2025
  • Raxis Sales Team Meeting Customer Needs

    Specialized Services: The Answer to Your Custom Cybersecurity Needs

    By Caroline Kelly We love to hear that our cybersecurity services have been useful to our customers. See how a specialized device test was just that and how we can help you too. August 21, 2025
  • Raspberry Pi

    Raspberry Pi Planted in Failed ATM Heist

    By Brian Tant Raxis Chief Penetration Tester Brian Tant discusses the Raspberry Pi used in a recent ATM heist and how Raxis uses the same type of device in our pentesting. August 14, 2025
  • Choosing a Penetration Testing Company: Part 3

    Choosing a Penetration Testing Company: Part 3

    By Caroline Kelly Caroline Kelly concludes our three-part “Choosing a Penetration Testing Company” series with how Penetration Testing as a Service (PTaaS) provides great value. July 29, 2025
  • OWASP Top 10 for LLM Applications

    OWASP Top 10 for LLM Applications Penetration Testing

    By Jason Taylor Lead Penetration Tester Jason Taylor looks at OWASP’s Top 10 list for LLM applications for penetration testing as AI machine learning becomes prevalent. July 15, 2025