SlideShare uma empresa Scribd logo
1 de 2
Businesses need to know why ransomware keeps on happening
One month after the WannaCry ransomware ravaged over three million computers around the world, a new
variant of the Petya ransomware seems to spreading even faster since Tuesday afternoon. This new malicious
software has infected more than 2,000 businesses worldwide in less than 24 hours and the list of victims
continues to grow at an alarming rate.
STRATEGIC ENTREPRISES ARE THE MAIN TARGET
If WannaCry was aiming in the dark when it came to choosing its victims, Petya has a clear preference for public
administrations and infrastructures.
The first signs of a serious infection surged in Ukraine, where it forced the Chernobyl nuclear plant to shift to
manual controls. Over one hundred strategic enterprises were also paralysed: the country’s main energy
providers, airports and administration, banking services and even its ATMs.
A few hours later, the Russian Central Bank, as well as one of the largest oil producers in the world, the Rosneft
group, joined the list of victims. In Europe and in the US, numerous multinationals had to deal with Petya, such
as the pharmaceutical giant Merck, the advertising specialist WPP, the first Danish marine carrier Maersk and
the biggest lawyer agency in the world – DLA Piper.
ANOTHER RANSOMWARE OR JUST HISTORY REPEATING
Dubbed Petrwrap, GoldenEye or Nyetya, the Petya ransomware was discovered for the first time in May 2015.
Today, we are facing a new variant of the initial malware. Some experts even went as far as declaring it is a
whole new virus to begin with, hence the nickname NotPetya.
Petya or NotPetya, there’s nothing new about the way it functions. Basically, once the ransomware is present on
a machine, it forces a reboot in the next few minutes. It then starts encrypting .doc (Word), .ppt (PowerPoint),
.xls (Excel), .pdf, .rar, .zip files. At the end, a message is displayed on the screen and the dreaded ransom note
appears. It’s either 300 dollars in exchange for the encryption key or nothing.
It’s only by taking a closer look at the way Petya infiltrates systems that we realize where the success of this
ransomware actually comes from.
Originally, the virus was launched with the help of a compromised update of a Ukrainian accounting programme
(MeDoc), which would explain why the country took the hardest blow. In parallel, according to a CERT alert,
Petya spread in various other countries via phishing campaigns (malicious emails containing malicious
attachments).
WHAT IS LEFT TO BE DONE
The news makes you wonder if people learned anything at all from the WannaCry incident.
For the sake of those so unfortunate to have been infected, here’s what you need to do right away: unplug your
machine from the network in order to prevent any additional damage to other connected devices. Once you
receive the ransom note, do not, we repeat, do not pay it. There’s absolutely no guarantee that the cybercriminals
behind it will even keep their word. On top of that, you’d be actually financing their activity further. In spite of
this being an expert consensus, over 6 000 dollars had already been deposited yesterday in the Petya bitcoin
account.
If you are among the lucky ones and have not yet been infected, we advice you to quickly download the MS17-
010 Microsoft Windows update. You may also limit your exposure to the SMB service or check out our solutions
designed to prevent this type of cyber-attack.
If you’ve already done your homework (be it before or after the WannaCry affair, it’s behind us now), you might
want to avoid opening any suspicious attachment received via email for a while.
WHY DOES THIS KEEP ON HAPPENING?
Today’s conclusions on the current cybersecurity state are quite grim. That being said, there’s no sole responsible
in this story.
Guilty party no. 1: cybercriminals.
If WannaCry and Petya were possible, it’s only because a certain hacking group – the Shadow Brokers, decided
to release a very dangerous 0-day vulnerability.
Guilty party no. 2: the NSA.
With great hacking weapons, comes great responsibility.
Guilty party no. 3: companies.
If you are tempted to quickly blame Microsoft for its faulty system, don’t. The company immediately released a
patched – the only problem, users needed to manually prompt it.
Many users today still feel cybersecurity is an issue that doesn’t directly concern them. That being the case, our
experts aspire to continuously monitor state of the art advancements in the area of cybersecurity and therefore
act as ambassadors in the pursuit of user awareness. For more tips on how to acquire an effective cyber-routine
and no longer be on the guilty side, you can check out our previous article here: ‘Targeting the Human behind
the Machine’.
Link:

Mais conteúdo relacionado

Mais de ITrust - Cybersecurity as a Service

Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?ITrust - Cybersecurity as a Service
 

Mais de ITrust - Cybersecurity as a Service (20)

Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 
Reveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FRReveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FR
 
Reveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet ENReveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet EN
 
Reveelium Data Science as a Service - Datasheet FR
Reveelium Data Science as a Service - Datasheet FRReveelium Data Science as a Service - Datasheet FR
Reveelium Data Science as a Service - Datasheet FR
 
Reveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet ENReveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet EN
 
ITrust Cybersecurity as a Service FR
ITrust Cybersecurity as a Service FRITrust Cybersecurity as a Service FR
ITrust Cybersecurity as a Service FR
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
 
Le côté obscur de la cybersécurité
Le côté obscur de la cybersécuritéLe côté obscur de la cybersécurité
Le côté obscur de la cybersécurité
 

Último

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 

Último (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 

Businesses need to know why ransomware keeps on happening

  • 1. Businesses need to know why ransomware keeps on happening One month after the WannaCry ransomware ravaged over three million computers around the world, a new variant of the Petya ransomware seems to spreading even faster since Tuesday afternoon. This new malicious software has infected more than 2,000 businesses worldwide in less than 24 hours and the list of victims continues to grow at an alarming rate. STRATEGIC ENTREPRISES ARE THE MAIN TARGET If WannaCry was aiming in the dark when it came to choosing its victims, Petya has a clear preference for public administrations and infrastructures. The first signs of a serious infection surged in Ukraine, where it forced the Chernobyl nuclear plant to shift to manual controls. Over one hundred strategic enterprises were also paralysed: the country’s main energy providers, airports and administration, banking services and even its ATMs. A few hours later, the Russian Central Bank, as well as one of the largest oil producers in the world, the Rosneft group, joined the list of victims. In Europe and in the US, numerous multinationals had to deal with Petya, such as the pharmaceutical giant Merck, the advertising specialist WPP, the first Danish marine carrier Maersk and the biggest lawyer agency in the world – DLA Piper. ANOTHER RANSOMWARE OR JUST HISTORY REPEATING Dubbed Petrwrap, GoldenEye or Nyetya, the Petya ransomware was discovered for the first time in May 2015. Today, we are facing a new variant of the initial malware. Some experts even went as far as declaring it is a whole new virus to begin with, hence the nickname NotPetya. Petya or NotPetya, there’s nothing new about the way it functions. Basically, once the ransomware is present on a machine, it forces a reboot in the next few minutes. It then starts encrypting .doc (Word), .ppt (PowerPoint), .xls (Excel), .pdf, .rar, .zip files. At the end, a message is displayed on the screen and the dreaded ransom note appears. It’s either 300 dollars in exchange for the encryption key or nothing. It’s only by taking a closer look at the way Petya infiltrates systems that we realize where the success of this ransomware actually comes from. Originally, the virus was launched with the help of a compromised update of a Ukrainian accounting programme (MeDoc), which would explain why the country took the hardest blow. In parallel, according to a CERT alert, Petya spread in various other countries via phishing campaigns (malicious emails containing malicious attachments).
  • 2. WHAT IS LEFT TO BE DONE The news makes you wonder if people learned anything at all from the WannaCry incident. For the sake of those so unfortunate to have been infected, here’s what you need to do right away: unplug your machine from the network in order to prevent any additional damage to other connected devices. Once you receive the ransom note, do not, we repeat, do not pay it. There’s absolutely no guarantee that the cybercriminals behind it will even keep their word. On top of that, you’d be actually financing their activity further. In spite of this being an expert consensus, over 6 000 dollars had already been deposited yesterday in the Petya bitcoin account. If you are among the lucky ones and have not yet been infected, we advice you to quickly download the MS17- 010 Microsoft Windows update. You may also limit your exposure to the SMB service or check out our solutions designed to prevent this type of cyber-attack. If you’ve already done your homework (be it before or after the WannaCry affair, it’s behind us now), you might want to avoid opening any suspicious attachment received via email for a while. WHY DOES THIS KEEP ON HAPPENING? Today’s conclusions on the current cybersecurity state are quite grim. That being said, there’s no sole responsible in this story. Guilty party no. 1: cybercriminals. If WannaCry and Petya were possible, it’s only because a certain hacking group – the Shadow Brokers, decided to release a very dangerous 0-day vulnerability. Guilty party no. 2: the NSA. With great hacking weapons, comes great responsibility. Guilty party no. 3: companies. If you are tempted to quickly blame Microsoft for its faulty system, don’t. The company immediately released a patched – the only problem, users needed to manually prompt it. Many users today still feel cybersecurity is an issue that doesn’t directly concern them. That being the case, our experts aspire to continuously monitor state of the art advancements in the area of cybersecurity and therefore act as ambassadors in the pursuit of user awareness. For more tips on how to acquire an effective cyber-routine and no longer be on the guilty side, you can check out our previous article here: ‘Targeting the Human behind the Machine’. Link: