The chronicle of WannaCry
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
17 articles
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
In addition to its primary targets, ransomware has infected some unusual devices.
Microsoft has released a patch for newly discovered critical vulnerability CVE-2020-0796 in the network protocol SMB 3.1.1.
How APTs compromise the privacy and security of average citizens that they do not target directly.
The botnet generally propagates through EternalBlue, the same vulnerability that made the WannaCry and NotPetya outbreaks possible.
The UK calls for Facebook regulation, lightsaber duels, Nike’s smart shoes, license plate emoji, and more, in the Kaspersky Lab Transatlantic Cable podcast.
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
In this edition of the Kaspersky Lab podcast, we discuss smart locks locking people out, Alexa playing doctor, and more.
For the last few years, ransomware has been evolving into a sophisticated cyberweapon. You need cutting-edge technologies to stop it.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
Embedded systems demand special protection from infections similar to WannaCry.
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
Kaspersky Lab is teaming up with Comae Technologies to present an emergency webinar for businesses to help them understand and defend against the WannaCry ransomware. The malware has primarily affected business networks, and has claimed victims around the world in a wide range of industries.
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.