Which environment is best for my application? How do I know how to size my instances? How do I minimize costs? Read more here: https://www.phoronix.com/scan.php?page=article&item=cloud-cpu-36&num=1
Read MoreThe Colorado Department of Transportation was brought to its knees by SamSam this week. Are you vulnerable? Read more: https://www.2-spyware.com/samsam-ransomware-hit-colorado-department-of-transportation?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BUj3NSRhaR4CEVe4QjP8aJQ%3D%3D
Read MoreReleased Tuesday: The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified Trojan malware variants—referred to as HARDRAIN and BADCALL—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. NCCIC/US-CERT encourages users and administrators to review the HIDDEN […]
Read MoreIn short, are your systems getting timely updates? This flaw could pose a problem if they aren’t. Microsoft has already released a patch to counter this issue, but many companies take too long to react to occurrences like this. White Raven can help your organization react quickly, and to prevent many vulnerabilities like this one […]
Read MoreLebanese spies are invading Android phones – At White Raven, we believe that this is just the beginning. The were able to get email, passwords, pins, contacts, logs, and could even take control of cameras. Protect yourself, even if you feel you have nothing to hide. Lebanese spy agency used Android app to spy on […]
Read More