Years ago, I had a neighbor who left his network open, and I would randomly fire off a script that would simultaneously access his floppy drives from multiple computers, creating a similar effect to this vulnerability – but my floppy drive attack would lock up the whole machine by using all the I/O the device […]Read More
If you still think that security can be something that you “get to as soon as…”, then you may already be in trouble. Too many companies pay little attention to the risk potential until it is too late, and the bad guys are well aware of it. Security is something that must be baked into […]Read More
While the costs of Cloud are generally a better ROI than hosting your own infrastructure, remember it isnt free.
Too often, we at White Raven have spoken to our peers in the industry who have complained about the sticker shock of moving to the cloud. Matthew Shooshtari has written an article discussing this phenomenon, and we wanted to expand ever so slightly on it. As a long-term infrastructure manager, it bears (in my opinion) […]Read More
According to Thales threat report, breaches have risen for companies by about 36% this year, with 67% of respondents reporting one or more in their environment. Other findings include that the top three methods of preventing data loss and breaches are : Data-at-rest protection Network Security Data-in-motion protection Interestingly, the findings state that most companies […]Read More
Spectre/Meltdown patches being rolled back by Microsoft and other vendors and China knew before the US?
As new developments unfold in the Spectre saga – it appears that Intel shared the news about the vulnerability with Chinese interests before those in the USA – this could mean that threat actors in that region were able to react before we even knew about it. Regardless of the legal and international ramifications, White […]Read More
As the infrastructure world is catching on to automation, so too is the security world beginning to take notice. Automating repetitive tasks in any IT environment reduces the need for staffing numbers, and increases the speed of reaction to potential issues. White Raven believes that automation is the key, so long as it is there […]Read More
We all tend to believe that our utilities providers are safe from intrusion – this is simply not true. White Raven believes that they hold huge potential for the bad guys to gain information, and this is likely just the first of many such exploits we will soon see in the news. Using information from […]Read More
Last year, there was a large spike in malicious redirect advertisements on the web. Consumers were caught by this time and again, even the big players weren’t immune (Equifax notoriously setup a website explaining their breach and giving consumers a chance to see if they were affected, only to have it become a haven for […]Read More
Have you ever wondered exactly what Microsoft collects from your PC? The company is releasing an application to allow you to do just that. Unfortunately, it would appear that even this step is tempered with some obfuscation of certain data points. This is a good first step – but the lack of full disclosure is […]Read More
Spectre and Meltdown are major vulnerabilities, ones that could have very far-reaching implications. As Intel and the other chip manufacturers are figuring out exactly what to do about the loss of performance on their chips, the major providers of operating systems have all released guidance on how to best approach the problem. For now, the […]Read More