Webcast: Latest on WannaCry / WannaCrypt Ransomware
- Recorded: Tuesday, May 16th
Friday May 12 witnessed an unprecedented ransomware attack known as WCrypt, which targeted healthcare, government, telecom, universities and other industries around the world. Jake Williams and Renato Marinho have been on the frontlines of this ransomware battle since it broke, and will provide an update on the latest facts and analysis in this webcast.
View Webcast Recording
Webcast: WannaCry Ransomeware Threat - What we know so far
- Recorded: Friday, May 12th
The WannaCry ransomware worm is unprecedented for two reasons. First, it's a ransomware worm. Second, it appears to be using a recently patched exploit that was stolen from NSA to propagate. Jake Williams' firm, Rendition Infosec, has been tracking the use of this exploit since it was publicly released and completed another internet wide scan of the Internet for this threat while you were in class today. Come learn what we know so far about the malware, the leaked exploits, mitigation strategies, and predictions for future impact.
View Webcast Recording
WannaCry / WannaCrypt Information from Internet Storm Center
- The SANS Internet Storm Center is on top of the WannaCry / WannaCrypt Ransomware attack. Johannes Ulrich, Dean of Research and a faculty member of the SANS Technology Institute, has produced an in-depth summary of the attack including a PPT presentation for Management and steps you can take to prevent Infection. Read the WannaCry / WannaCrypt Ransomware Summary.
Whitepaper: Reverse Engineering of WannaCry Worm and Anti Exploit Snort Rules
- Posted: May 27th
- Today, a lot of malware is being created and utilized. To solve this problem, many researchers study technologies that can quickly respond automatically to detected malware. Using artificial intelligence (AI) is such an example. However, modern AI has difficulty responding to new attack methods. On the other hand, malware consists of variants, and the root (core) part often uses the same technology.
Download the paper
For other resources about Ransomware visit here