Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From The Frontlines

  • Why We Don’t Change Risk Ratings on Pentest Findings (Even When You Ask Nicely)
    Penetration Testing | Security Recommendations

    Why We Don’t Change Risk Ratings on Pentest Findings (Even When You Ask Nicely)

    ByTim Semchenko November 4, 2025September 15, 2025

    Raxis’ Tim Semchenko explains why we can’t lower risk ratings for your penetration test findings just because you ask and why that’s a good thing.

    Read More Why We Don’t Change Risk Ratings on Pentest Findings (Even When You Ask Nicely)Continue

  • Salesforce Compromise: What You Need to Know
    Exploits | In The News | Phishing | Security Recommendations

    Salesforce Compromise: What You Need to Know

    ByJason Taylor October 15, 2025October 13, 2025

    The FBI has released information to help organizations that are affected by recent attacks against Salesforce. Raxis’ Jason Taylor sums up next steps here.

    Read More Salesforce Compromise: What You Need to KnowContinue

  • Copilot Coming Soon to a Desktop Near You
    In The News | Security Recommendations

    Microsoft Copilot Coming Soon to a Desktop Near You

    ByJason Taylor October 2, 2025September 18, 2025

    With Microsoft automatically installing Copilot on Windows systems with Microsoft 365 desktop apps installed, organizations will want to set up AI policies.

    Read More Microsoft Copilot Coming Soon to a Desktop Near YouContinue

  • Lateral Movement: From Beachhead to Breach
    Exploits | How To | Networks | Penetration Testing | Security Recommendations

    Lateral Movement: From Beachhead to Breach

    ByNate Jernigan September 23, 2025August 21, 2025

    Raxis Senior Penetration Tester Nate Jernigan discusses lateral movement in penetration testing and the methods and tools he uses when performing these attacks.

    Read More Lateral Movement: From Beachhead to BreachContinue

  • Lessons from the DaVita Healthcare Ransomware Attack
    In The News | Networks | Penetration Testing | Security Recommendations | Social Engineering

    Lessons from the DaVita Healthcare Ransomware Attack

    ByBrian Tant September 18, 2025September 15, 2025

    The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit the impact.

    Read More Lessons from the DaVita Healthcare Ransomware AttackContinue

  • Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios
    Exploits | Penetration Testing | Security Recommendations | Web Apps

    Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios

    ByRyan Chaplin August 26, 2025July 11, 2025

    Lead Penetration Tester Ryan Chaplin walks us through 5 real-world attack scenarios used in real-world penetration tests by Raxis.

    Read More Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack ScenariosContinue

  • Choosing a Penetration Testing Company: Part 3
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 3

    ByCaroline Kelly July 29, 2025September 2, 2025

    Caroline Kelly concludes our three-part “Choosing a Penetration Testing Company” series with how Penetration Testing as a Service (PTaaS) provides great value.

    Read More Choosing a Penetration Testing Company: Part 3Continue

  • Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities
    Exploits | In The News | Patching | Security Recommendations

    Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

    ByJason Taylor July 22, 2025August 22, 2025

    Microsoft has released patches for two critical vulnerabilities allowing unauthenticated remote code execution that affect on-premises SharePoint installations.

    Read More Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint VulnerabilitiesContinue

  • Choosing a Penetration Testing Company: Part 2
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 2

    ByBrad Herring July 1, 2025September 2, 2025

    Brad Herring continues our three-part “Choosing a Penetration Testing Company” series with a look at the factors to consider when choosing the best vendor.

    Read More Choosing a Penetration Testing Company: Part 2Continue

  • Cisco Releases Patch for CVE-2025-20188 - 10.0 CVSS
    Exploits | In The News | Security Recommendations | Wireless

    Cisco Releases Patch for CVE-2025-20188 – 10.0 CVSS

    ByScottie Cole May 8, 2025May 8, 2025

    Critical Alert – Patch Immediately. Cisco Releases Patch for CVE-2025-20188 – 10.0 CVSS. This vulnerability affects Cisco Catalyst 9800 wireless controllers.

    Read More Cisco Releases Patch for CVE-2025-20188 – 10.0 CVSSContinue

  • Choosing a Penetration Testing Company: Part 1
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 1

    ByCole Stafford April 22, 2025September 2, 2025

    Cole Stafford starts our three-part “Choosing a Penetration Testing Company” series by looking at what penetration testing is and the types of penetration tests.

    Read More Choosing a Penetration Testing Company: Part 1Continue

  • Understanding PTaaS: Penetration Testing as a Service
    Penetration Testing | PTaaS | Security Recommendations

    Understanding PTaaS: Penetration Testing as a Service

    ByBonnie Smyre March 5, 2025March 6, 2025

    What does Penetration Testing as a Service (PTaaS) really mean? In this blog we discuss the details and how do you find the best PTaaS for your organization.

    Read More Understanding PTaaS: Penetration Testing as a ServiceContinue

Page navigation

1 2 3 … 7 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube