An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.
Blocking refers to the practice of deploying network security devices to block threats as they traverse the network.
While Microsoft could have slowed the spread of WannaCry, the real problem lies in the widespread practice of deploying outdated software and systems.
Effective defense against large-scale ransomware attacks such as WannaCry starts with basic endpoint protection and patch management.
Organizations affected by the WannaCry ransomware attack can leverage IBM X-Force Threat Intelligence with QRadar to mitigate this unprecedented threat.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
An effective vulnerability management strategy requires continuous visibility into endpoint activity and real-time control over devices in a network.
The disclosure of an Apache Struts 2 vulnerability made the framework a lucrative target and highlighted the importance of patch management.
The Wireshark development team addressed dozens of vulnerabilities, segmentation flaws and bugs with the latest version of its network protocol analyzer.
A recent Linux update patched a vulnerability that enabled fraudsters to use heap spraying methods to execute arbitrary code and escalate permissions.