Just a short month after the WikiLeaks dump came the sudden flood of software exploits, all from the National Security Agency’s systems. Most of these were initially labeled as zero-day exploits that focused on older Windows operating systems that hadn’t received security updates, something which many large organizations had yet to implement. While Microsoft was quick to push out patches for these vulnerabilities, some of which were available for nearly a month prior to the actual Shadow Broker’s reveal, these exploits were later used for some of the largest ransomware attacks to date.
Tag Cloud
AI
android
antivirus
artificial intelligence
backup
bloatware
brightcloud threat intelligence
cloud computing
cryptocurrency
cyber resilience
cyberscam
data breach
data protection
deepfake
digital identity
dns protection
endpoint security
https
identity management
identity theft
infosec
insurance
ios
mac
machine learning
malware
password
password protection
PC optimizer
personal data
phishing
podcast
privacy
ransomware
remote work
security awareness training
small business security
social media
texting scam
text scam
threat intelligence
virus
vpn
wifi security
windows






