Mike Mimoso and Chris Brook discuss this week’s ExPetr global ransomware outbreak, how it was distributed, the wiper aspect, and similarities to 2016’s Petya ransomware.

Siemens Patches Critical Intel AMT Flaw in Industrial Products
Siemens patched a recently disclosed vulnerability pertaining to systems with specific Intel processors. If exploited, the flaw could let an attacker gain system privileges.

Average Bug Bounty Payments Growing
HackerOne released its first report on its bug bounty program, and reveals an industry shift toward enlisting hackers for better cybersecurity.

Second Global Ransomware Outbreak Under Way
A massive ransomware outbreak is spreading globally and being compared to WannaCry.

NSA Advocates Data Sharing Framework
Fighting attackers needs a new approach that leverages a public-private data sharing framework, enabling immediate and collective responses.

Siemens Patches Vulnerabilities in SIMATIC CP, XHQ
Siemens patched two vulnerabilities in products, SIMATIC CP and XHQ, commonly found in industrial control system setups this week

Trump’s Cybersecurity Executive Order Under Fire
Former AT&T CSO, Ed Amoroso, says government needs to shift from talk to action when it comes to cybersecurity.

NSA-Backed OpenC2.org Aims to Defend Systems at Machine Speed
Security experts, vendors, business and the NSA are developing a standardized language that rather than autonomously understands threats, acts on them.

Nigerian BEC Scams Hit 500 Companies in 50 Countries
A Kaspersky Lab report on Thursday said an especially potent Nigerian Business Email Compromise campaign has stolen sensitive data from over 500 companies in 50 countries.

DHS, FBI Warn of North Korea ‘Hidden Cobra’ Strikes Against US Assets
DHS and the FBI warned that North Korean attackers are targeting U.S. businesses with malware- and botnet-related attacks that are part of concerted effort dubbed “Hidden Cobra.”