Home / Blog / All Blog Posts

Alert Logic Blogs 

WannaCry – A Propagation brought to you by EternalBlue and DoublePulsar

WannaCry – A Propagation brought to you by EternalBlue and DoublePulsar

Learn about the WannaCry ransomware attack, which spread rapidly across 150 countries in 2017, impacting over 100,000 organizations. Discover how it used the EternalBlue exploit and DoublePulsar backdoor to propagate and the role of a ‘kill-switch’ that halted its spread. Explore practical tips on protecting your systems from similar threats, including patching vulnerabilities and strengthening network defenses.

Unfolding the Apache Struts Vulnerability

Unfolding the Apache Struts Vulnerability

Protecting and Monitoring Apache Struts, which is a critical remote code execution vulnerability affecting Struts newer versions of 2.3.5 – 2.3.31 and Struts 2.5-2.5.10.

Apache Struts Makes a Comeback

Apache Struts Makes a Comeback

Apache Struts is a critical remote code execution vulnerability affecting Struts newer versions of 2.3.5 – 2.3.31 and Struts 2.5-2.5.10.

The Top 8 Data Security Best Practices to Protect Against a Successful Breach

The Top 8 Data Security Best Practices to Protect Against a Successful Breach

Proactively evaluating and improving your existing cybersecurity strategy based on a comprehensive approach across pre-breach and post-breach risks can significantly reduce your likelihood of being affected by cybercrime. Here are 8 data security best practices that can significantly reduce the likelihood of a successful attack and minimize the impact of those that are successful.

Ready to Protect Your Company with Alert Logic?