Security Recommendations

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Security Recommendations

  • Scottie in 2004 on Navarre Beach in the wake of the Hurricane Ivan

    Hurricane Ida: Limiting the Damage

    By Scottie Cole Lead penetration tester Scottie Cole is a Gulf Coast resident and former first responder. Read his tips for avoiding hackers and scams that can be as costly as a natural disaster. September 1, 2021
  • PRTG Network Monitor Stored Cross-Site Scripting Vulnerability (CVE-2021-29643)

    PRTG Network Monitor Stored Cross-Site Scripting Vulnerability (CVE-2021-29643)

    By Raxis Research Team Raxis lead penetration tester Matt Dunn uncovers a new vulnerability in the PRTG Network Monitor (CVE-2021-29643). Read more here. August 20, 2021
  • Screaming person with smartphone

    Don’t Take the Smishbait

    By Bonnie Smyre Unwanted text messages are annoying, but some also hide malicious links. Here are some ways to avoid being “smished.” July 30, 2021
  • JavaScript Execution to Display User's Cookie in an Alert Box

    ManageEngine Applications Manager Stored Cross-Site Scripting Vulnerability (CVE-2021-31813)

    By Raxis Research Team Raxis’ Matt Dunn has discovered another ManangeEngine cross-site scripting (XSS) vulnerability, this time in the Applications Manager product (CVE-2021-31813). June 25, 2021
  • Two people at laptops sending data at each other

    Why Mutual Assured Destruction is an Incomplete Cyber Defense Strategy

    By Bonnie Smyre Is the threat of full-scale retaliation enough to prevent large-scale cyberattacks? Raxis’ Bonnie Smyre explains why this Cold War strategy is not effective. May 14, 2021
  • .be .wa .re .sc .am .me .rs

    A High-Tech Take on an Old-Time Scam

    By Brian Tant Don’t fall prey to scammers trying to convince you that your domain name is about to be stolen by an overseas company. April 23, 2021