WannaCry: A Massive Ransomware Outbreak

WannaCry: What do you need to know?   Following the release of NSA hacking dumps by Shadow Brokers, blackhat hacker groups used 2017’s most famous Microsoft Windows exploit created by NSA’s “ETERNALBLUE” which takes advantage of a vulnerability in Windows SMB protocol. The hacker group behind WannaCry ransomware launched the largest cyber attack in years...
Read More

Logjam Security Vulnerability (CVE-2015-4000)

Following the continuous revealing of security vulnerabilities with the most unimaginable names such as “Shellshock” (CVE-2014-6271 and CVE-2014-7169), “POODLE” (CVE-2014-3566), “POODLE 2.0” (CVE-2014-8730) and “GHOST” (CVE-2015-0235) affecting SSL, TLS and other widely-used security protocols, it was just a matter of time until the curtain rolled revealing the latest security vulnerability this time affecting Diffie-Hellman algorithm for...
Read More