Much of the world was still scrambling to patch and clean up from WannaCry ransomware attack when the (not)Petya attack hit. While (not)Petya relied on Eternal Blue, just as WannaCry did, it had a few new tricks.
Read more >
- No Kill Switch – There doesn’t appear to be a kill switch URL, so (not)Petya can’t be shut down simply by purchasing a domain name.
- Lateral Movement – The new attack includes additional exploits so it can move laterally through the network and infect other devices.
- New Unmanaged Devices – Reports say the attack hit point of sale devices and ATMs, in addition to the laptops and desktops.
Join Nadir Izrael, CTO of Armis, and former Captain in the Israel Intelligence 8200 Group, to discuss the 3 steps you should take to prepare for the next ransomware attack. And, why your weakest link now exposures your entire enterprise.
About the Presenter:
As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.