The devices owners need to act fast to stop potential exploitation of the vulnerability by implementing the recommended mitigation strategies. The damaging nature of the flaw forced Microsoft to patch all Windows versions, including Windows 2003, Windows XP, Windows 7, Windows Server 2008, and Windows Server 2008 R2.

Understanding the BlueKeep Flaw

Cyber-security and the IT communities have been constantly discussing the BlueKeep flaw for the last two weeks. The security vulnerability was first spotted during the May 2019 Patch Tuesday release. Microsoft was quick to release security patches for the BlueKeep Flaw. However, not all Windows users installed the latest updates on their machines. Microsoft said that the attack works similarly to the Bad Rabbit and WannaCry ransomware attacks that caused severe damage in 2017. It should be noted that the malware has the capability to spread on its own to other systems. The threat level is higher just like all the other attacks. But luckily, this time, the malware was not successful in replicating the damage. Now, companies can easily mitigate the risk by applying the corresponding security patches. In case you want to be secure while surfing the internet, you will need to get a full-dedicated tool to secure your network.  Install now Cyberghost VPN and secure yourself. It protects your PC from attacks while browsing, masks your IP address and blocks all unwanted access.

Around 1 million devices remain vulnerable

The head of offensive security research firm Errata Security performed a detailed scan of the internet to determine the number of devices that are still vulnerable to BlueKeep attacks. The results were shocking that revealed that the BlueKeep flaw can easily target around 950,000 devices available on the internet.  We can see that most of the individuals and organizations didn’t bother to deploy the latest security patch on their systems. This condition is extremely risky as attackers have the opportunity to target healthcare and other important industries.  Robert Graham explained in his research: Due to some limitations of the research, Graham fears that the number of vulnerable systems can bypass the 1 million figure. Therefore, it is highly recommended that you should apply the latest patches before BlueKeep attacks actually begin. Otherwise, you risk running into serious trouble caused by this WannaCry-style malware attack. RELATED ARTICLES YOU NEED TO CHECK OUT:

9 best antivirus software with encryption to secure your data in 2019 Hackers can take over your printer: Here’s how to stop them Chrome vulnerability lets hackers collect user data via PDF files

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ