Windows exploit notice


Windows exploit
Today new ransomware appeared on the Internet which abuses a Windows 7/2008/2012 exploit in the SMBv1 service. Alot of desktop computers and servers over the world are being infected at the moment. Therefor we would like to remind you to run the latest Windows updates and disable the SMBv1 service within PowerShell:
Set-SmbServerConfiguration -EnableSMB1Protocol $false
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" SMB1 -Type DWORD -Value 0 -Force


This should protect you against this malicious software.
Please let us know if you have any questions.