Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • JavaScript Execution to Display User's Cookie in an Alert Box
    Security Recommendations

    ManageEngine Applications Manager Stored Cross-Site Scripting Vulnerability (CVE-2021-31813)

    ByRaxis Research Team June 25, 2021July 28, 2025

    Raxis’ Matt Dunn has discovered another ManangeEngine cross-site scripting (XSS) vulnerability, this time in the Applications Manager product (CVE-2021-31813).

    Read More ManageEngine Applications Manager Stored Cross-Site Scripting Vulnerability (CVE-2021-31813)Continue

  • Two people at laptops sending data at each other
    In The News | Security Recommendations

    Why Mutual Assured Destruction is an Incomplete Cyber Defense Strategy

    ByBonnie Smyre May 14, 2021July 28, 2025

    Is the threat of full-scale retaliation enough to prevent large-scale cyberattacks? Raxis’ Bonnie Smyre explains why this Cold War strategy is not effective.

    Read More Why Mutual Assured Destruction is an Incomplete Cyber Defense StrategyContinue

  • .be .wa .re .sc .am .me .rs
    Security Recommendations

    A High-Tech Take on an Old-Time Scam

    ByBrian Tant April 23, 2021

    Don’t fall prey to scammers trying to convince you that your domain name is about to be stolen by an overseas company.

    Read More A High-Tech Take on an Old-Time ScamContinue

  • SonicWall
    Patching | Security Recommendations

    SonicWall Patches Three Zero-Day Vulnerabilities

    ByRaxis Research Team April 21, 2021

    Cybersecurity company SonicWall has released patches for three zero-day vulnerabilities that are currently being exploited.

    Read More SonicWall Patches Three Zero-Day VulnerabilitiesContinue

  • Emblem of the Foreign Intelligence Service of the Russian Federation
    In The News | Patching | Security Recommendations

    NSA, FBI, CISA Statement on Russian SVR Activity

    ByRaxis Research Team April 21, 2021July 31, 2025

    The US government is warning businesses to beware of vulnerabilities being exploited by the Russian Foreign Intelligence Service (SVR RF). But that’s not the only group taking advantage. Here’s what you should do.

    Read More NSA, FBI, CISA Statement on Russian SVR ActivityContinue

  • Remediating Account Enumeration Vulnerabilities
    How To | Security Recommendations

    Remediating Account Enumeration Vulnerabilities From Your Penetration Test

    ByRaxis Research Team April 9, 2021June 16, 2025

    Account enumeration reveals whether usernames are valid for use in other attacks. Lead Penetration Tester Matt Dunn explains how it works and how to prevent it.

    Read More Remediating Account Enumeration Vulnerabilities From Your Penetration TestContinue

  • Security Cameras
    Security Recommendations | Tips For Everyone

    Three Questions to Ask Before Connecting a Device to the Internet

    ByScottie Cole March 26, 2021July 28, 2025

    Should you connect your latest device to the Internet? Lead Penetration Tester Scottie Cole recommends asking yourself some questions before you do.

    Read More Three Questions to Ask Before Connecting a Device to the InternetContinue

  • Hands holding mobile phone
    Security Recommendations

    Why Companies Shouldn’t Overlook Mobile Application Testing

    ByBrian Tant February 9, 2021June 2, 2025

    Penetration tests are as important for mobile applications as they are for their web app counterparts. Here’s why.

    Read More Why Companies Shouldn’t Overlook Mobile Application TestingContinue

  • How to Pull Off a Mousejacking Attack
    Exploits | How To | Security Recommendations

    How to Pull Off a Mousejacking Attack

    ByRaxis Research Team February 5, 2021July 28, 2025

    Raxis’ penetration testing team demonstrates how to conduct a mousejacking attack to gain access as part of a penetration test.

    Read More How to Pull Off a Mousejacking AttackContinue

  • Penguin with red cross
    Patching | Security Recommendations

    Sudo Privilege Escalation Vulnerability Discovered

    ByRaxis Research Team January 27, 2021

    Qualys has discovered and reported a serious vulnerability (CVE-2021-3156) affecting the sudo utility. Patches are now available and Raxis recommends applying them immediately.

    Read More Sudo Privilege Escalation Vulnerability DiscoveredContinue

  • Cisco with bandaids
    Patching | Security Recommendations

    Cisco Patches Critical Security Vulnerabilities

    ByRaxis Research Team January 22, 2021August 22, 2025

    Cisco releases patches for some critical and high-severity vulnerabilities. Learn about the vulnerabilities and patches from the Raxis penetration testing team.

    Read More Cisco Patches Critical Security VulnerabilitiesContinue

  • Understanding Vulnerability Management
    Security Recommendations

    Understanding Vulnerability Management

    ByBrian Tant January 14, 2021June 6, 2025

    One of our most common findings in Raxis penetration tests is the lack of an effective vulnerability management system. Here’s why that’s important.

    Read More Understanding Vulnerability ManagementContinue

Page navigation

Previous PagePrevious 1 2 3 4 5 6 7 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube