Solutions That Work
Explore our range of services, from expert consulting and digital forensics to cutting-edge offensive security testing. Think like a hacker, trust Raven for comprehensive cybersecurity expertise.

General Consulting
Tailored consulting services to assess and strengthen cybersecurity systems.

Digital Forensics
Expert digital investigations to uncover and analyze cyber incidents.

Offensive Security Testing
Proactive testing to identify vulnerabilities and fortify cybersecurity defenses.


About Raven Cybersecurity
Raven Cybersecurity, headquartered in Southeast Michigan, offers specialized cybersecurity services to small businesses, prioritizing robust digital defense.
Our founder, with a wealth of enterprise experience, leads a team dedicated to proactive defense and expert security guidance.
-
Getting Started with AI Hacking: Part 1
You may have read some of our previous blog posts on Artificial Intelligence (AI). We discussed things like using PyRIT […]
-
Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run that could […]
-
“Nudify” deepfakes stored unprotected online
Yesterday, we told you about how millions of pictures from specialized dating apps had been stored online without any kind […]
-
A steam locomotive from 1993 broke my yarn test
So the story begins with a pair programming session I had with my colleague, which I desperately needed because my […]
-
Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers
Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance […]
-
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH […]