In-brief: focusing on WannaCry, the ransomware delivered in last week’s attacks, misses the point. Organizations weren’t done in by the shoddy malware, but by a class-A offensive cyber weapon known as EternalBlue. Editor’s Note: this blog is cross posted from Digital Guardian’s Data Insider blog.
Search Results for "WannaCry"
In-brief: We speak with Sean Dillon of the firm RiskSense, who helped reverse engineer DoublePulsar and EternalBlue, the Windows exploit tools used to help spread the WannaCry ransomware. We also chat with John Dickson of The Denim Group about the impact of President Trump’s Cyber Executive Order.
Security Ledger Editor in Chief Paul Roberts speaks with Sean Dillon, a senior security analyst at RiskSense who has analyzed exploits of key Windows security holes released by the group Shadow Brokers. Those exploits and tools have helped spread WannaCry, a ransomware program. Paul also talks with John Dickson, a Principal at the Denim group regarding President Trump’s Cyber Executive order.
In-brief: A fatal flaw in its design slowed the spread of WannaCry, a virulent ransomware program that has infected more than 100,000 organizations and individuals globally.
While many organizations think the notion of keyboards, monitors and other hardware “spying” on them as the stuff of “James Bond” movies, Yossi Appleboum of Sepio Systems says that the threat is real – and much more common that either companies or consumers are aware.