Two years since the WannaCry attacks wreaked havoc around the world, researchers say hundreds of thousands of people are being targeted with the EternalBlue exploit on which it was based.
A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.
Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
SerNet recently revealed that it will work with Microsoft to fix the SMB protocol SAMBA's vulnerability with a patch deployed in April.
A trip to a graveyard leads to insights on why turning massive volumes of data into security intelligence can be so difficult — and how to simplify it.