The Exploit articles categorized as Security Recommendations
-

CVE-2025-59886 Eaton Exploit Code Published
By Jason Taylor With exploit code available for the vulnerabilities in Eaton’s xComfort Ethernet Communication Interface, Jason Taylor recommends replacing or isolating. February 5, 2026 -

Publicly Accessible Database Discovered Hosting 149 Million Credentials
By Andrew Trexler Andrew Trexler looks at a recently discovered public database of stolen usernames and passwords and what you can do now to protect your access and information. February 2, 2026 -

The Growing Threat: Attackers Using GitHub Repositories as Malware Staging Mechanisms
By Brian Tant Recent attacks, including GitVenom and Lumma Stealer, underscore the threat of Attackers using GitHub repositories as malware staging mechanisms. January 21, 2026 -

CVE‑2020‑12812 and Why It’s Still an Issue Five Years Later
By Scottie Cole Principal Penetration Tester Scottie Cole explains why Fortinet released a new security advisory about CVE‑2020‑12812 and what your organization should check. January 16, 2026 -

Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password Cracker
By Brad Herring With the start of 2026, the Raxis team is already busy. A new upgrade to our password-cracking system shows how quickly 8-character passwords can be cracked. January 9, 2026 -

The Role of AI in Penetration Testing
By Bonnie Smyre Bonnie Smyre shows how Raxis’ AI-augmented pentesting gives their expert pentesters more time for complex chained attacks and discovery of business-logic flaws. December 2, 2025