A major ransomware attack using a leaked NSA exploit known as “WannaCry” has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread. WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk. During this webcast (https://www.brighttalk.com/webcast/11673/261293) Mark Butler, CISO at Qualys and Jimmy Graham, Director of Product Management for Qualys ThreatPROTECT and AssetView, show you how to: • Patch and implement other mitigations for WannaCry • Detect and get full visibility on impacted assets for prompt remediation • Institute threat-prioritized remediation processes to mitigate current and future risks Qualys ThreatPROTECT can detect and identify patches for the vulnerabilities being exploited by ETERNALBLUE and shield your organization’s business-critical data from attacks. Sign up for a free 30 day trial and get unlimited scans. https://qualys.com/wannacry-trial