Within weeks of the last Shadow Brokers dump, organizations in over 150 different countries were dealing with the WannaCry ransomware that spread like wildfire across at least 150,000 individual endpoint devices. By propagating like a worm, the infection was able to spread quickly, exploiting several largely unpatched vulnerabilities in several Windows operating systems. While a patch for un-updated systems has been publicly available since March, many organizations struggled to roll it out to their endpoints, or couldn’t do so without rendering their proprietary software unusable. Months after the initial WannaCry campaign was launched, systems across the globe were still getting infected, including a Honda production plant in Japan, and an entire network of traffic cameras in Australia.
The risk of #phishing attacks is high, especially for remote workers.
Our latest report explores the impacts of COVID-19 on user security: https://wbrt.io/click
#remotework | #cybersecurity
Nearly 18 months after Microsoft disclosed a Windows RDP vulnerability, more than 245K systems—25% of the initial total discovered—remain unpatched: https://wbrt.io/2IJ4MC5
#datasecurity | #infosec