Hands holding mobile phone
Why Companies Shouldn’t Overlook Mobile Application Testing

Penetration tests are as important for mobile applications as they are for their web app[…]

How to Pull Off a Mousejacking Attack
How to Pull Off a Mousejacking Attack

Raxis demonstrates how to conduct a mousejacking attack as part of a penetration test.

Penguin with red cross
Sudo Privilege Escalation Vulnerability Discovered

Qualys has discovered and reported a serious vulnerability (CVE-2021-3156) affecting the sudo utility. Patches are[…]

Cisco with bandaids
Cisco Patches Critical Security Vulnerabilities

Cisco releases patches for some critical and high-severity vulnerabilities.

Understanding Vulnerability Management
Understanding Vulnerability Management

One of our most common findings in Raxis penetration tests is the lack of an[…]

Happy New Year! (Good riddance, 2020)
The Most Important Cybersecurity Lessons of 2020

This past year was one to remember. Here are a couple of cybersecurity lessons we[…]

How to Protect Your Tesla from an Attack
So, I Hacked a Tesla . . .

Tesla is leading the way in electric vehicle adoption. But the company has a few[…]

Raxis COO Bonnie Smyre
Five Red Flags for Black Friday

Shop safely this holiday season by paying attention to these red flags for Black Friday[…]

Cisco Smart Install
Why you should turn off Cisco Smart Install now

Cisco Smart Install is handy for admins, but a security risk if it’s improperly managed.

Curriculaville
A Herring Haunting at Curriculaville Next Wednesday

What’s scarier than ghosts and goblins? Brad Herring has some terrifying tales to tell at[…]

Brian Tant, Raxis VP of Engineering
Why Network Segmentation is a Best Security Practice

Network segmentation can be an important line of defense against hackers. Raxis’ CTO Brian Tant[…]