Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: Penetration Testing as a Service
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: Penetration Testing as a Service
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • The following is a reenactment of a typical physical security assessment performed by a professional Raxis security engineer
    Exploits | Penetration Testing | Security Recommendations

    Here’s How Hackers Can Get Through Your Doors and Onto Your Network

    ByBrian Tant June 12, 2020July 28, 2025

    Just a guy who left something at work and had to run back in? But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started.

    Read More Here’s How Hackers Can Get Through Your Doors and Onto Your NetworkContinue

  • Canned air attack
    Exploits | Penetration Testing | Security Recommendations

    Can This Simple Trick Outwit Your Smart Security?

    ByBrad Herring June 5, 2020

    Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself.

    Read More Can This Simple Trick Outwit Your Smart Security?Continue

  • Hand using plastic card to open a locked door
    Exploits | In The News | Patching | Security Recommendations

    Windows 10 Vulnerability Highlights Need for Physical Security Testing

    ByRaxis Research Team May 28, 2020July 28, 2025

    A Windows 10 security problem offers an excellent example of what can happen when a bad guy gets to spend a few minutes alone with your computer.

    Read More Windows 10 Vulnerability Highlights Need for Physical Security TestingContinue

  • Scientist putting a specimen in a test tube
    Exploits | In The News | Security Recommendations

    Pharma Breaches and the Terrifying Prospect of Data Manipulation

    ByBrian Tant May 14, 2020July 28, 2025

    Raxis CTO Brian Tant shares his thoughts on cybersecurity threats to the pharma industry and what pharma companies can do to protect themselves.

    Read More Pharma Breaches and the Terrifying Prospect of Data ManipulationContinue

  • Laptop with VPN on
    Networks | Security Recommendations | Tips For Everyone

    Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s Why

    ByBrian Tant May 1, 2020July 28, 2025

    Raxis CTO Brian Tant discusses how VPNs protect our most critical data and why your company should require a VPN for remote access.

    Read More Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s WhyContinue

Page navigation

Previous PagePrevious 1 … 13 14 15 16 17 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube