May 21, 2019 Hundreds of Thousands of Users Targeted Daily With Would-Be WannaCry Imitators 2 min read - Two years since the WannaCry attacks wreaked havoc around the world, researchers say hundreds of thousands of people are being targeted with the EternalBlue exploit on which it was based.
April 15, 2019 Attackers Use EternalBlue and PowerShell Scripts to Spread Cryptomining Malware Across Asia 2 min read - A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
January 8, 2019 NRSMiner Crypto-Mining Malware Infects Asian Devices With the Help of EternalBlue Exploit 2 min read - Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.
July 31, 2017 TrickBot Learns From WannaCry and Petya by Adding Self-Spreading Worm Module 2 min read - Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
Malware June 27, 2017 Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe 6 min read - It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
Network June 9, 2017 Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late 2 min read - To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
Network June 7, 2017 Using Network Insights to Stay One Step Ahead of Emerging Threats 3 min read - With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
March 28, 2016 Samba, a SMB Protocol, to Be Patched April 12 2 min read - SerNet recently revealed that it will work with Microsoft to fix the SMB protocol SAMBA's vulnerability with a patch deployed in April.
Intelligence & Analytics September 11, 2014 Why Turning Data Into Security Intelligence Is So Hard 4 min read - A trip to a graveyard leads to insights on why turning massive volumes of data into security intelligence can be so difficult — and how to simplify it.