Aggregator
How a Young Cybersecurity Researcher Stopped WannaCry Ransomware in Its Tracks
8 years 7 months ago
Last Friday, the biggest ransomware attack we’ve seen hit organizations everywhere, impacting more than 150 countries. It shut down a...
The post How a Young Cybersecurity Researcher Stopped WannaCry Ransomware in Its Tracks appeared first on McAfee Blog.
McAfee
Strike Back at Silent Bob: Scan and Block Ports Used by Intel AMT
8 years 7 months ago
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
Strike Back at Silent Bob: Scan and Block Ports Used by Intel AMT
8 years 7 months ago
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
Count the number of Duplicates
8 years 7 months ago
Count the number of DuplicatesWrite a function that will return the count of distinct case-insensiti
首发 | Wannacry勒索软件母体主程序逆向分析(含临时解决方案自动化工具
8 years 7 months ago
声明:本文由expsky@MS509Team原创,仅用于技术交流分享 挺长时间没做逆向分析了,以前做逆
首发 | Wannacry勒索软件母体主程序逆向分析(含临时解决方案自动化工具
8 years 7 months ago
声明:本文由expsky@MS509Team原创,仅用于技术交流分享 挺长时间没做逆向分析了,以前做逆
首发 | Wannacry勒索软件母体主程序逆向分析(含临时解决方案自动化工具
8 years 7 months ago
声明:本文由expsky@MS509Team原创,仅用于技术交流分享 挺长时间没做逆向分析了,以前做逆
“WannaCry” Ransomware Spreads Like Wildfire, Attacks Over 150 Countries
8 years 7 months ago
Update: The McAfee team has developed a tool that can be used in an effort to recover files that have been...
The post “WannaCry” Ransomware Spreads Like Wildfire, Attacks Over 150 Countries appeared first on McAfee Blog.
McAfee
From NSA Exploit to Widespread Ransomware: WannaCry Is on the Loose
8 years 7 months ago
The new EternalBlue NSA exploit is powering a wave of virulent ransomware sweeping across Europe.
From NSA Exploit to Widespread Ransomware: WannaCry Is on the Loose
8 years 7 months ago
The new EternalBlue NSA exploit is powering a wave of virulent ransomware sweeping across Europe.
The Bondnet Army: Questions & Answers
8 years 7 months ago
The following is a select list of questions and answers that we hope will shed more light on the botnet.
Ravit Greitser
The Hunt for IoT: The Networks Building Death Star-Sized Botnets
8 years 7 months ago
With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...
The Hunt for IoT: The Networks Building Death Star-Sized Botnets
8 years 7 months ago
With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...
Can Your Risk Assessment Stand Up Under Scrutiny?
8 years 8 months ago
Risk assessments are a key part of a security program, but their execution and format are highly variable. Regulators can sanction organizations that perform improper or inadequate risk assessments.
Can Your Risk Assessment Stand Up Under Scrutiny?
8 years 8 months ago
Risk assessments are a key part of a security program, but their execution and format are highly variable. Regulators can sanction organizations that perform improper or inadequate risk assessments.
May 2017 security update release
8 years 8 months ago
Today, we released security updates to provide additional protections against malicious attackers. By default, Windows 10 receives these updates automatically, and for customers running previous versions, we recommend they turn on automatic updates as a best practice.
More information about this month’s security updates can be found on the Security Update Guide.
Coming together to address Encapsulated PostScript (EPS) attacks
8 years 8 months ago
Today’s security updates include three updates that exemplify how the security ecosystem can come together to help protect consumers and enterprises. We would like to thank FireEye and ESET for working with us.
Customers that have the latest security updates installed are protected against the attacks described below. As a best practice to ensure customers have the latest protections, we recommend they upgrade to the most current versions.
May 2017 security update release
8 years 8 months ago
Today, we released security updates to provide additional protections against malicious attackers. By default, Windows 10 receives these updates automatically, and for customers running previous versions, we recommend they turn on automatic updates as a best practice.
More information about this month’s security updates can be found on the Security Update Guide.
Coming together to address Encapsulated PostScript (EPS) attacks
8 years 8 months ago
Today’s security updates include three updates that exemplify how the security ecosystem can come together to help protect consumers and enterprises. We would like to thank FireEye and ESET for working with us.
Customers that have the latest security updates installed are protected against the attacks described below. As a best practice to ensure customers have the latest protections, we recommend they upgrade to the most current versions.