Lares Featured in Recent EternalBlue Article

Lares Featured in Recent EternalBlue Article

Lares Featured in Recent EternalBlue Article 200 200 Andrew Hay

Our friend Dan Raywood over at Infosecurity Magazine recently published his Q2 2020 Parting Shots editorial piece with several references to Lares and our 2019 Top 10 Penetration Test Findings report. From the article:

It is now more than three years since patches were released by Microsoft to fix the vulnerability named MS17-010, and therefore three years since the exploit EternalBlue was released by Shadow Brokers, ultimately enabling the WannaCry and NotPetya attacks in 2017.

This is all old news right? Well, it seems that despite those attacks affecting a large number of businesses, in particular the NHS, and causing repair costs of around $100m, it seems we are not out of the woods just yet when it comes to getting over the issues which enabled those attacks.

According to data from security consultancy Lares, EternalBlue was still among its most frequently encountered vulnerabilities and attack vectors in the six months between Q4 of 2019 and Q1 of 2020.

The piece also features commentary from our friend Brian Honan, CEO of BH Consulting. Read the full editorial piece here: https://www.infosecurity-magazine.com/editorial/parting-shots-q2-2020/.

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.