Recently, a new version of NRSMiner was found actively spreading malware in Asia by either updating existing NRSMiner infections or spreading to new systems using the EternalBlue exploit. EternalBlue is the exploit that was stolen by the Shadow Brokers, leaked to the public, and responsible for the WannaCry and NotPetya outbreaks that crippled businesses in 2017. Today, nearly two years later, it’s still being used to spread malware to systems that have failed to issue patches.
Total losses resulting from WannaCry alone are estimated as high as $4 billion, and ransomware remains a prevalent threat. Patching challenges have often been at fault as more than 57% of successful breaches can be linked, at some level, to unpatched systems. Unfortunately, some existing risk and compliance solutions that organizations use to address endpoint management rely on slow and incomplete legacy architectures. This often makes it difficult and time intensive to see and locate unpatched or noncompliant endpoints. And with successful patch compliance sometimes taking some organizations as long as 90 days to achieve even 80% completeness, it’s clear patching is a source of many disconnects. IT teams need to be able to act with speed and confidence. Implementing a low touch, safe, and effective patching strategy will help you reduce time installing security patches.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.