The blackhats have created a new strain of malware that targets the same vulnerability as the WannaCry ransomware from the first week of May. The Malware is called as EternalRocks, which uses the same flaw in Microsoft’s SMB networking protocol to infect other Windows systems that haven’t yet been patched with MS17-010. However, this new […]

Read More →

WannaCry (also known as Wana Decrypt0r 2.0, Wannacryptor, WannaCrypt, wana Decryptor) ransomware disrupts 2-3 millions of devices around 150 countries, taking important files as a hostage and demanding a ransom of $600 worth of bitcoins. The ransomware is found to be using the old SMB vulnerability (MS17-010 released in April 2017) to spread across devices. There was no second doubt […]

Read More →

The Magic Button There is a magic button that is going to save us all. Mathematical modeling, sandboxing, behavioral analysis, machine learning, EDR, what not button. Just click it. Patching vulnerability is gone thing, who is going to sit and roll out those tedious little things. I have invested in magic button. Why should we […]

Read More →

Microsoft May 2017 Patch Tuesday addressing 56 security vulnerabilities in addition to 7 vulnerabilities for Adobe Flash Player. The May security release consists of security updates for the following software: Internet Explorer Microsoft Edge Microsoft Windows Microsoft Office and Microsoft Office Services and Web Apps NET Framework Adobe Flash Player Three Windows Zero-day vulnerabilities have […]

Read More →

Adobe has released two security updates for Adobe Flash Player, and Adobe Experience Manager Forms. The updates addresses a critical vulnerability in Adobe Flash Player and an important vulnerability in Adobe Experience Manager Forms. The security update covers a total of 8 CVE’s. These flaws allow attackers to take complete control of the system. The Linux and Mac operating systems […]

Read More →

Over the past few years, enterprises have been hit by complex and advanced ransomware attacks. With a heroic entry, they came and conquered many. Enterprises have seen their most important data locked in the hands of criminals expecting a ransom for their illegal activity. When they left, they also took with them the enterprise’s money, […]

Read More →