As the WannaCry outbreak demonstrated, many organizations run outdated operating systems. Too often when systems - and especially embedded devices - still function, there isn't a convincing business case for upgrading. ESET's Mark James asks: Whose fault is that?
When malware comes gunning for your national health service, you're going to take it personally. And that's just one reason why the WannaCry outbreak in particular boosted cybersecurity awareness in the U.K. and around the world, says Barracuda's Hatem Naguib.
As the count of NotPetya victims grows, Ukraine warns that it's also being targeted with a new WannaCry lookalike that hit state power distributor Ukrenergo. Security researchers say that marks the fourth recent campaign targeting Ukraine that's based on lookalike ransomware.
In the wake of the surge in business email compromise incidents, many organizations have implemented new anti-phishing controls. But the attackers are countering the counter-measures, says Agari's Wes Dobry. What is the best response?
Malware known as NotPetya, SortaPetya or GoldenEye continues to spread globally, infecting endpoints via leaked Equation Group exploits as well as built-in Windows tools. Here's a roundup of what we know about the supposed ransomware and its spread so far.
The Cyber Threat Alliance is developing playbooks that will show organizations how to stop hackers from causing havoc. Alliance President Michael Daniel explains how the playbook could help to disrupt a cyber attacker's business model and processes.
A massive, global ransomware outbreak has been hitting airports, banks, shipping firms and other businesses across Europe and beyond. Security experts say the apparent Petya variant appears to spread in part by exploiting the "EternalBlue" SMB flaw in Windows, previously targeted by WannaCry.
How can a supercomputer help enterprise security teams respond to today's evolving threat landscape? Martin Borrett of IBM and Ronan Murphy of Smarttech discuss the promise and impact of Watson for Cyber Security.
With massive profits available to criminals who can infect PCs and servers and extract a ransom, it's no surprise that attacks involving crypto-locking ransomware continue to increase. Security experts say such attacks are increasingly driven by ransomware-as-a-service programs.
A Google security researcher has once again found a potentially devastating vulnerability in Microsoft's Malware Protection Engine, the core component of anti-malware systems that ship with every Windows computer and server.
With the increased emphasis on detection and response, practitioners may be beginning to dilute the fundamentals of security, neglecting the need to first protect and defend, says Brijesh Datta, CISO at Reliance Jio Infocomm.