Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Cloud, VPC, and Internal Networks
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Cloud, VPC, and Internal Networks
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From the Frontlines

  • Lessons from the DaVita Healthcare Ransomware Attack
    In The News | Networks | Penetration Testing | Security Recommendations | Social Engineering

    Lessons from the DaVita Healthcare Ransomware Attack

    ByBrian Tant September 18, 2025September 15, 2025

    The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit the impact.

    Read More Lessons from the DaVita Healthcare Ransomware AttackContinue

  • Choosing a Penetration Testing Company: Part 3
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 3

    ByCaroline Kelly July 29, 2025September 2, 2025

    Caroline Kelly concludes our three-part “Choosing a Penetration Testing Company” series with how Penetration Testing as a Service (PTaaS) provides great value.

    Read More Choosing a Penetration Testing Company: Part 3Continue

  • Choosing a Penetration Testing Company: Part 2
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 2

    ByBrad Herring July 1, 2025September 2, 2025

    Brad Herring continues our three-part “Choosing a Penetration Testing Company” series with a look at the factors to consider when choosing the best vendor.

    Read More Choosing a Penetration Testing Company: Part 2Continue

  • Jailbreak Journey: Transforming an iPad for Mobile App Penetration Testing
    Exploits | How To | Mobile Apps

    Jailbreak Journey: Transforming an iPad for Mobile App Penetration Testing

    ByJason Taylor June 3, 2025May 29, 2025

    Lead Penetration Tester Jason Taylor takes us step-by-step through jailbreaking an iPad 7 for use in penetration testing.

    Read More Jailbreak Journey: Transforming an iPad for Mobile App Penetration TestingContinue

  • Choosing a Penetration Testing Company: Part 1
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 1

    ByCole Stafford April 22, 2025September 2, 2025

    Cole Stafford starts our three-part “Choosing a Penetration Testing Company” series by looking at what penetration testing is and the types of penetration tests.

    Read More Choosing a Penetration Testing Company: Part 1Continue

  • Understanding PTaaS: Penetration Testing as a Service
    Penetration Testing | PTaaS | Security Recommendations

    Understanding PTaaS: Penetration Testing as a Service

    ByBonnie Smyre March 5, 2025March 6, 2025

    What does Penetration Testing as a Service (PTaaS) really mean? In this blog we discuss the details and how do you find the best PTaaS for your organization.

    Read More Understanding PTaaS: Penetration Testing as a ServiceContinue

  • Tips for Scoping Your Penetration Test
    Penetration Testing

    Tips for Scoping Your Penetration Test

    ByBrad Herring January 28, 2025June 24, 2025

    Scoping your penetration test (especially your first one) can be daunting. Our team is always happy to help, and Brad Herring gives you a head start here.

    Read More Tips for Scoping Your Penetration TestContinue

  • Cool Tools Series: Vim
    How To | Penetration Testing

    Cool Tools Series: How Vim Powers Penetration Testing

    ByAndrew Trexler January 14, 2025August 17, 2025

    Principal Penetration Tester, Andrew Trexler, dives into Vim, a powerful command line tool for text files, and shows useful commands for penetration testing.

    Read More Cool Tools Series: How Vim Powers Penetration TestingContinue

  • Cybersecurity: It’s how to say “Yes.”
    Security Recommendations | Tips For Everyone

    Cybersecurity: It’s how to say “Yes.”

    ByMark Puckett December 31, 2024

    Contrary to common misconceptions, cybersecurity acts as a powerful enabler in the digital age, fostering innovation, driving business growth, and empowering organizations to harness technology’s full potential. By building trust, accelerating innovation, enabling emerging technologies, enhancing efficiency, ensuring compliance, supporting remote work, and protecting intellectual property, robust cybersecurity measures create a secure foundation for organizations to thrive and innovate in an increasingly interconnected world.

    Read More Cybersecurity: It’s how to say “Yes.”Continue

  • Cool Tools Series: Masscan
    How To | Penetration Testing

    Cool Tools Series: Masscan for Penetration Testing

    ByAndrew Trexler December 3, 2024June 16, 2025

    Continuing our Cool Tools Series, Lead Penetration Tester Andrew Trexler shows how to use masscan for discovery scanning on large networks in penetration tests.

    Read More Cool Tools Series: Masscan for Penetration TestingContinue

  • Cool Tools Series: Host Discovery
    How To | Networks | Penetration Testing

    Cool Tools Series: Host Discovery in Penetration Testing

    ByScottie Cole July 2, 2024June 16, 2025

    Raxis’ pentester, Scottie Cole, leads off our new Cool Tools Series with tips on tools for host discovery and vulnerability discovery for penetration tests.

    Read More Cool Tools Series: Host Discovery in Penetration TestingContinue

  • OWASP Top 10 2021
    Penetration Testing | Web Apps

    OWASP Top 10: The Bedrock of an Application Penetration Test

    ByAdam Fernandez April 23, 2024

    When performing web app, mobile app, and API penetration tests, we refer to the OWASP Top 10. Here we’ll discuss what that means and why it’s helpful.

    Read More OWASP Top 10: The Bedrock of an Application Penetration TestContinue

Page navigation

1 2 3 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube