The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
A new scanning app found that more than 50,000 systems across the world are still vulnerable to the EternalBlue exploit, despite a patch being available.
Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.
Since bitcoin conversions are processed on a blockchain, security analysts can trace transactions to determine the root cause of a ransomware attack.
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.
The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.