Featured Blog PostsFeatured RAVENii Blog Posts
Cybersecurity: Myths And Assumptions About Ransomware
cybersecuritysecurityransomware
Ransomware is currently the greatest cybersecurity concern for organizations because it is also the most profitable tactic for tech criminals. The cost to those victimized by ransomware extends much farther than just the ransom. Clean-up and recovery…
Cyber Security Threats: Ransomware
ransomwaresecuritythreats
When it comes to cybersecurity threats, ransomware is one of the scariest. Ransomware blocks access to all or parts of your system until a demand for money is met. Ransomware is most commonly spread through phishing emails containing malicious…
Cybersecurity Concerns In Bringing Employees Back To The Office
pandemiccybersecuritysecurity
Cybersecurity has been a major concern since the rush to get employees set up to work remotely at the beginning of the pandemic. The staggered return to offices is now creating additional cybersecurity risks, but also an opportunity for CIOs and IT…
All Blog PostsAll RAVENii blog posts.
Cybersecurity: Myths And Assumptions About Ransomware
cybersecuritysecurityransomware
Ransomware is currently the greatest cybersecurity concern for organizations because it is also the most profitable tactic for tech criminals. The cost to those victimized by ransomware extends much farther than just the ransom. Clean-up and recovery…
Cyber Security Threats: Ransomware
ransomwaresecuritythreats
When it comes to cybersecurity threats, ransomware is one of the scariest. Ransomware blocks access to all or parts of your system until a demand for money is met. Ransomware is most commonly spread through phishing emails containing malicious…
Cybersecurity Concerns In Bringing Employees Back To The Office
pandemiccybersecuritysecurity
Cybersecurity has been a major concern since the rush to get employees set up to work remotely at the beginning of the pandemic. The staggered return to offices is now creating additional cybersecurity risks, but also an opportunity for CIOs and IT…
Verkada Breach
securityverkadadata
Established in 2016, Verkada sells a full suite of physical security monitoring tools that will watch your everyday spaces with devices like indoor and outdoor cameras, door entry regulations, and tools for movement, heat, and sound. The hardware…
Hafnium Targeting Exchange Servers
securityhafniummicrosoftexchange
As of March 2, 2021, Microsoft uncovered several zero-day activities, that currently are being utilized on multiple versions of Microsoft Exchange Server (MES) that are being targeted for attacks. We can see with the incidents that have occurred, the…
Silver Sparrow – Apple Silicon Mac’s Questionable Malware
securitymalwareapple
At the beginning of February, investigators have uncovered a ton of macOS malware that utilized a Launch Agent to produce its existence, like several additional models of malware. What became more of concern to the investigators was that the malware…
VMware ESXi vSphere Client (HTML5)
vmwarevspherevulnerabilityremote code execution
VMware vCenter Server updates address remote code execution vulnerability in the vSphere Client (CVE-2021-21972) Various exposures in VMware ESXi as well as vSphere Client (HTML5) have been clandestinely notified to VMware. Revises are accessible to…
Why USB Devices are Vulnerable
usbvulnerabilitydid you know
Did You Know... USBs are an extremely successful instrument for attack. We all use them and they come in many different shapes and forms; we use them to store or transport business and personal information, we also use them to charge our phones…
The Cost of a Breach
securityhafniummicrosoftexchange
The Cost of Cyber Crime Target, Equifax, Adobe, eBay, LinkedIn, Yahoo, Twitter, Marriott, MGM Resorts, Garmin. What do all of these businesses have in common? They have all been victims of cyber-attacks. In 2019, The FBI’s Internet Crime Complaint…
Twitter Security Breach
securitybreachtwitter
On Wednesday, July 15, 2020, Twitter detected a security incident and took immediate action. The attack targeted certain Twitter employees through social engineering. The attackers successfully manipulated a small number of employees and used their…
Security Concerns and Exploits (July 2020)
securityexploitspalo altof5 big ip
Palo Alto Networks Most of us spent the 4th of July holiday celebrating with family and friends and enjoying our extended weekends. Others spent the the 4th of July sleuthing around creating exploitable vulnerabilities for two commonly used…
Security Tool Effectiveness
securityconfigurationtools
It's time to validate the effectiveness of your cybersecurity solutions and here's why. A recent study showed that only a small percentage of attacks generate alerts and most intrusions go undetected due to misconfigured security tools. "Due to the…
Back to the Office
securitycovid 19work from homestatistics
Hi ho, hi ho, it's back to the office we go. Are you ready? For months now we have been talking about the pandemic; about the risks of contracting the virus and about the dangers of how quickly it spreads to infect other unsuspecting victims. As we…
Phishing Threats Are Rising Dramatically
securityphishingthreat
Bad actors are taking advantage of the drastic, almost overnight shift to working from home. In a recent survey by Check Point and Dimensional Research, it found that 71% of the 411 Security and IT professionals assessed have noticed an increase in…
Pandemic Response vs. Cybersecurity Best Practices
pandemicsecuritycybersecurity
Over the past few months, we've all witnessed the unfolding of the coronavirus pandemic. We've watched closely as our local, state and federal leaders work to contain its spread in order to save lives. In the cybersecurity realm, observations have…
Not Your Typical Patch Tuesday
securitypatchmicrosoftwindowsvulnerability
On Tuesday, April 14, 2020 Microsoft fixed 113 security vulnerabilities in its various Windows operating systems and related software. Three are actively being exploited. Two others have been detailed to the public prior to the release. Nineteen were…
‘War Dialing’ Tool Exposes Zoom’s Password Problems
securityzoomremote workremote conference
SecKC members’ creation of zWarDial has found a workaround to evade Zoom’s attempts to block automated meeting scans. Trent Lo, a security professional and co-founder of SecKC, and fellow SecKC members recently created zWarDial and discovered that…
A Message From the CEO
pandemicsecurity
With the increase in concern regarding the coronavirus nationally and locally, I wanted to share with you that RAVENii will be implementing their Pandemic Policy effective Monday, March 16, 2020. We have been closely monitoring the information being…
CONTACT US

Contact us for more information about our services.