cross-referenced news and research resources about

 WannaCry logo
images:  google   yahoo YouTube

updated Sun. July 9, 2017 reload page to refresh

Microsoft has released some details on the Fireball malware, which was initially reported by Check Point researchers. Microsoft has pointed out that malware's ...
It's not just WannaCry: Locky is targeting hospitals on outdated Windows platforms. It appears the hackers rushed the latest round of the notorious ransomware, since the campaign is currently only able to lock down XP, VistA and other older operating ...

As breach after breach hits the news, security professionals cope with the classic experiences of denial, anger, bargaining, depression, and acceptance.
More so than in any other industry, the recent WannaCry attack caused health care organizations to rethink processes for keeping systems current and secure.
The WannaCry cyberattack crippled hundreds of thousands of computers but one organisation appears to have ended up benefiting from the ransomware attack in a big way.
Fireball struck one in five organizations worldwide, RoughTed hit 16% and WannaCry struck at 8%, said the study from the Check Point Research Team.

More than one in four organizations globally was affected by the Fireball or WannaCry attacks during May. According to Check Point's latest Global Threat Impact Index, two of the top three malware families that impacted networks globally were zero-day, ...
Was the impression that WannaCry was "everywhere" accurate? Why did WannaCry receive so much media attention when the attack was actually less significant than other recent malware attacks?
With all of the press the WannaCry ransomware exploit received last month, you might be excused for thinking that by now everyone would have battened down the hatches and locked down potentially dangerous ports - at least those that are vulnerable to ...
The WannaCry cyberattack has implications for the future of healthcare security, especially as the recent health care Industry Cybersecurity Task Force report came out essentially saying that the healthcare industry is in the midst of a staffing crisis.
Anyone who hadn't heard of ransomware prior to May 12 is certainly aware of it now. WannaCry, a variant that burst onto the global scene targeting computers running Microsoft Windows, reportedly netted less than $80,000 in bitcoin even though the ...
The security industry was left shaken by the malware outbreak dubbed WannaCry. Starting on May 12, the attack rapidly spread to hundreds of countries, holding hundreds of thousands of computer systems hostage via a ransomware virus.
British officials appear to have come to the same conclusions as several IT security vendors: the WannaCry ransomware attacks were launched by North Korea-linked hacking group Lazarus.
government portal MCA21 came under WannaCry attack. By PTI | Updated: Jun 18, 2017, 04.05 PM IST. Post a Comment. The WannaCry attack is reported to have impacted over two lakh computers in more than 150 countries.
View of British intelligence officials shared by South Korea and some major cybersecurity firms. Getty Images. A German railway station displays a ransomware demand during the May cyberattack that used a worm called WannaCry. By ...
The most intriguing mystery that remains about WannaCry is the identity of the attacker. The theory with the best legs is that North Korea's Lazarus APT is the entity behind the worldwide ransomware outbreak given the discovery of shared code samples ...
British intelligence officials believe that a group linked to North Korea perpetrated last month's massive cyberattack, which crippled computer networks at British ...

Only days after nearly 100 countries were hit by what's now known as the biggest worldwide cyber attack in history, young people from across the country are ...
London (CNNMoney) - There's mounting evidence that North Korea was behind last month's WannaCry ransomware attack that hit hundreds of thousands of computers around the world.
The global WannaCry worm attack that began on May 11 has renewed the debate on cyber security versus nation-states attempting to build offensive cyberweapons by keeping under wraps the vulnerabilities of various computing platforms known to ...
WannaCry was able to spread so effectively because of a known vulnerability that Microsoft patched back in March. Organizations that fell victim had failed to patch, and many lacked basic security protections and working backups.
The number of computer systems compromised by the global WannaCry ransomware attack last month was grossly underestimated, a cybersecurity expert told members of Congress on Thursday.
As reports of the NSA officially connecting WannaCry to North Korea surface, experts are saying developers failed to contain the ransomware before it was ...
Britain's National Cyber Security Centre (NCSC) has reportedly attributed the WannaCry malware, which affected the NHS and other organisations worldwide in May, to the North Korean-affiliated Hacking Team Lazarus Group.
SPEAKING OF KASPERSKY AND WANNA CRY: Rep. Clay Higgins (R-La.) told two House science subcommittees they should take antivirus magnate Eugene Kaspersky up on his offer to testify before Congress during a joint hearing on Wanna Cry on ...
It's not clear yet whether it's the same WannaCry virus that spread through the NHS, but UCL has been forced to disconnect large parts of its system in order to contain the threat.
A push to declassify cyber-related intelligence would lead to better information-sharing and be the most effective way to face down the next WannaCry, former U.S. Chief Information Security Officer Gregory Touhill said at a June 15 congressional hearing.
The WannaCry worm that infected organisations in 150 countries in May has been blamed on North Korea by the US's National Security Agency (NSA).
And when it came to the file-sharing SMB port 445 vulnerability exposed with the WannaCry attacks, 4.6 million internet-connected devices left this port open in 2016.
Microsoft has released new security updates for older versions of Windows as it warns of potential cyber-attacks by government organisations.
Chinese security firms have hit out against suggestions that last month's global WannaCry ransomware outbreak can be blamed on China.
With one month of hindsight, and a lot of research, under the industry's belt, analysts are still in the process of building a complete picture of the WannaCry ransomware attack that took the world by storm, but some points are firmed up. Tom Levasseur ...
House lawmakers on Thursday will hold a hearing examining the "Wanna Cry" ransomware attack that spread to more than 150 countries and dealt a crippling blow to Britain's national health system last month.
The global malware infection WannaCry spread across computers in over 48 NHS organisations in May 2017, raising questions about how protected NHS data are.
I try not to jump on bandwagons, but with so much coverage of the worldwide WannaCry mess, I do have a few things to say that you may not have seen elsewhere.
Arizona cybersecurity experts called the recent international cyberattack known as "WannaCry" among the worst they have seen, and warned about the country's lack of cybersecurity preparation.
There was one positive aspect of the WannaCry scourge, Schneier admitted: Once the NSA realized EternalBlue had been distributed, the agency notified Microsoft which released a patch that limited the damage.
The WannaCry ransomware virus code could be used in future attacks with nation-state motivations, a Symantec expert said, even though WannaCry was likely not state-sponsored. Vikram Thakur, technical director of Symantec Security Response, told ...
The Wanna Cry ransomware attack forced Britain's NHS to cancel surgeries. The software seized and locked computer files until a ransom was paid.
Adylkuzz is a piece of malicious software that doesn't encrypt your files or demand that you pay a ransom. It doesn't steal your emails or erase your data.
Data released yesterday by Kryptos Logic reveals that most WannaCry victims are located in China, and not Russia, as various antivirus vendors have announced during the WannaCry ransomware outbreak. The numbers released by Kryptos Logic are more ...
The WannaCry cyber attack that hit 150 countries could have been the work of Chinese-speaking hackers, new research shows. Researchers at Flashpoint have dismissed reports that North Korean hackers were behind the ransomware attack after finding ...
windows xp isn't as vulnerable to the WannaCry ransomware as many assumed, according to a new report from Kryptos research.
"The self-spreading 'WannaCry' internet worm, which ripped through 160,000 computers and crippled hospitals and other businesses, is now being linked to a North Korean cyber gang," reports Kevin Poulsen at Daily Beast.
This comes as the latest in a string of malware and ransomware attacks and database hacks that have been orchestrated over the last few weeks all over the world, like the WannaCry ransomware attack that affected 56 crore systems, and the Zomato ...
"The self-spreading 'WannaCry' internet worm, which ripped through 160,000 computers and crippled hospitals and other businesses, is now being linked to a North Korean cyber gang," reports Kevin Poulsen at Daily Beast.
WannaCry and its variants began showing up in early May. Although the criminals largely failed to cash in on their worldwide scheme, experts in cyber security are warning their customers to be diligent and well prepared, because new attacks are likely ...
This new strain of ransomware, called WannaCry or WanaCrypt0r 2.0, was unlike anything ever seen before. By convincing someone to open an email attachment with a compressed zip folder, hackers were able to unleash WannaCry to the world.
The authors of the WannaCry malware, which infected computers in 150 countries two weeks ago, are probably from the southern mainland, Hong Kong, Taiwan or Singapore, according to a US intelligence company.
North Korea top suspect for WannaCry attack, says ex US security chief. Methods used in ransomware attack on NHS and in up to 100 countries similar to those used by Pyongyang in the past, says Michael Chertoff.