Right on the heels of the WannaCry ransomware infestations comes a new worm called BlueDoom. This worm was caught in a honeypot, and it uses the Eternal Blue exploit the NSA developed—and a hacker group called The Shadow Brokers stole.…Read more
WannaCrypt/WannaCry may best be remembered as the cybersecurity breach that convinced enterprises the world over that ransomware is a threat that is never going away. Already, multiple variants of the original code have been discovered “in the wild.” As has …Read more
Prior to installing a home security system, a discovery process must take place to evaluate all vulnerabilities around the property. No matter how good a home security system is, it is worthless if you do not secure every window and …Read more
Your supply chain is humming along. Shipments are on track, the system is optimized and productivity is up. Then it happens: a widespread ransomware attack is all over the news. Are you protected? Could it knock you offline? Well, that …Read more
Security professionals dread the day when they get the call that ransomware has infiltrated their network and has already started encrypting files, drives and network shares. After the initial shock has worn off and the ransomware is no longer encrypting …Read more
UPDATE 5/18/17: As widely published, the WannaCrypt ransomware checks for a specific URL and proxy settings before it starts. If the URL is active, it will not run. Furthermore, if a proxy is required to access the Internet, the ransomware …Read more
Without a doubt, Rob Juncker is a man about town. Country. World. Sometimes the best way to catch up with him is through a Q & A. Like this one.