In-brief: focusing on WannaCry, the ransomware delivered in last week’s attacks, misses the point. Organizations weren’t done in by the shoddy malware, but by a class-A offensive cyber weapon known as EternalBlue. Editor’s Note: this blog is cross posted from Digital Guardian’s Data Insider blog.
Search Results for "WannaCry"
In-brief: We speak with Sean Dillon of the firm RiskSense, who helped reverse engineer DoublePulsar and EternalBlue, the Windows exploit tools used to help spread the WannaCry ransomware. We also chat with John Dickson of The Denim Group about the impact of President Trump’s Cyber Executive Order.
Podcast: Play in new window | Download (Duration: 22:53 — 52.4MB) | EmbedSubscribe: Android | Email | Google Podcasts | RSSSecurity Ledger Editor in Chief Paul Roberts speaks with Sean Dillon, a senior security analyst at RiskSense who has analyzed exploits of key Windows security holes released by the group Shadow Brokers. Those exploits and tools have helped spread WannaCry, a ransomware program. Paul also talks with John Dickson, a Principal at the Denim group regarding President Trump’s Cyber Executive order.
In-brief: A fatal flaw in its design slowed the spread of WannaCry, a virulent ransomware program that has infected more than 100,000 organizations and individuals globally.
In this Spotlight edition of the Security Ledger Podcast, sponsored by Trusted Computing Group*: we’re joined by Rob Spiger, a principal security strategist at Microsoft and co-chair of the cyber resilient technologies working group at Trusted Computing Group. Rob talks to us about efforts to make more resilient connected devices and how the advent of the Internet of Things is changing TCG’s approach to building cyber resilient systems.