BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:AUS Eastern Standard Time BEGIN:STANDARD DTSTART:16010401T030000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4 TZOFFSETFROM:+1100 TZOFFSETTO:+1000 END:STANDARD BEGIN:DAYLIGHT DTSTART:16011007T020000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=10 TZOFFSETFROM:+1000 TZOFFSETTO:+1100 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT CLASS:PUBLIC CREATED:20190302T075828Z DESCRIPTION:Abusing SMB or How Network Worms are still a Risk for Enterpris es\nBenny Ketelslegers (Threat Researcher\, Talos) hosted by Cecil Gonzale s\n \nNetwork shares have been a popular target of computer worms\, but th eir popularity waned in recent years\, overshadowed by high-profile attack s that used email and compromised websites. This all changed about 18 mont hs ago with the release of the EternalBlue exploit. As WannaCry cut a path of destruction across the threat landscape\, attention was drawn back to network shares\, and in particular a popular protocol central to many: Ser ver Message Block (SMB).\n DTEND;TZID="AUS Eastern Standard Time":20190307T163000 DTSTAMP:20190302T075828Z DTSTART;TZID="AUS Eastern Standard Time":20190307T161000 LAST-MODIFIED:20190302T075828Z LOCATION:https://www.cisco.com/c/m/en_au/ciscolive/security/index.html PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=en-au:Abusing SMB or How Network Worms are still a Risk fo r Enterprises TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E00800000000E0C5BF3081D0D401000000000000000 0100000001540DDC161B3B048BC955C85C0C869A3 X-ALT-DESC;FMTTYPE=text/html:

< span lang=EN-GB style='font-family:"Calibri"\,sans-serif\;color:black\;mso -ansi-language:EN-GB'>Abusing SMB or How Network Worms are still a Risk fo r Enterprises

Be nny Ketelslegers (Threat Researcher\, Talos) hosted by Cecil Gonzales

< p class=MsoNormal> \;

Network shares have been a popular target of computer worms\, but their popularity waned in recent years\, overshadowed by high-profile atta cks that used email and compromised websites. This all changed about 18 mo nths ago with the release of the EternalBlue exp loit. As WannaCry cut a path of destruction across the threat landscape\, attention was drawn back to network shares\, and in particular a popular p rotocol central to many: Server Message Block (SMB).

X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MS-OLK-AUTOFILLLOCATION:FALSE X-MS-OLK-CONFTYPE:0 BEGIN:VALARM TRIGGER:-PT15M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR