Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: Penetration Testing as a Service
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: Penetration Testing as a Service
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • Voice Phishing - Social Engineering[Part 2]
    Phishing | Social Engineering

    Voice Phishing – Social Engineering [Part 2]

    ByBonnie Smyre April 4, 2018January 28, 2025

    Raxis COO Bonnie Smyre discusses voice or phone phishing, also know as vishing, and how you can train your employees not to fall for the bait.

    Read More Voice Phishing – Social Engineering [Part 2]Continue

  • Phishing Emails - Social Engineering [Part 1]
    Phishing | Social Engineering

    Phishing Emails – Social Engineering [Part 1]

    ByBonnie Smyre March 23, 2018January 17, 2025

    Raxis helps many companies avoid corporate and customer information leakage from phishing emails targeted at unsuspecting employees. Raxis COO Bonnie Smyre tells more here.

    Read More Phishing Emails – Social Engineering [Part 1]Continue

  • Physical Security Pitfalls
    Social Engineering

    Physical Security Pitfalls: What our physical assessments show us

    ByBrian Tant April 19, 2017July 28, 2025

    Effective infosec programs are built upon strong physical security. Once an attacker gains physical access, chances of a data breach become much higher.

    Read More Physical Security Pitfalls: What our physical assessments show usContinue

  • Low Battery
    Social Engineering | Tips For Everyone

    Public USB Charging Ports & Their Potential Security Risks

    ByBrad Herring January 19, 2017

    Raxis VP of Business Development Brad Herring discusses the risks associated with using public USB charging ports.

    Read More Public USB Charging Ports & Their Potential Security RisksContinue

  • Aerial Drones - A New Frontier for Hackers?
    Exploits | In The News | Social Engineering

    Aerial Drones – A New Frontier for Hackers

    ByBrad Herring January 2, 2017

    Raxis VP of Business Development discusses how aerial drones, which are now prevalent, can be used in attacks on your security and what you can do to protect your company.

    Read More Aerial Drones – A New Frontier for HackersContinue

Page navigation

Previous PagePrevious 1 2 3 4 5 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube