id sid tid token lemma pos blog-dshr-org-2370 1 1 DSHR DSHR NNP blog-dshr-org-2370 1 2 's 's POS blog-dshr-org-2370 1 3 Blog blog NN blog-dshr-org-2370 1 4 : : : blog-dshr-org-2370 1 5 A a DT blog-dshr-org-2370 1 6 Modest modest JJ blog-dshr-org-2370 1 7 Proposal proposal NN blog-dshr-org-2370 1 8 About about IN blog-dshr-org-2370 1 9 Ransomware Ransomware NNP blog-dshr-org-2370 1 10 DSHR DSHR NNP blog-dshr-org-2370 1 11 's 's POS blog-dshr-org-2370 1 12 Blog Blog NNP blog-dshr-org-2370 1 13 I -PRON- PRP blog-dshr-org-2370 1 14 'm be VBP blog-dshr-org-2370 1 15 David David NNP blog-dshr-org-2370 1 16 Rosenthal Rosenthal NNP blog-dshr-org-2370 1 17 , , , blog-dshr-org-2370 1 18 and and CC blog-dshr-org-2370 1 19 this this DT blog-dshr-org-2370 1 20 is be VBZ blog-dshr-org-2370 1 21 a a DT blog-dshr-org-2370 1 22 place place NN blog-dshr-org-2370 1 23 to to TO blog-dshr-org-2370 1 24 discuss discuss VB blog-dshr-org-2370 1 25 the the DT blog-dshr-org-2370 1 26 work work NN blog-dshr-org-2370 1 27 I -PRON- PRP blog-dshr-org-2370 1 28 'm be VBP blog-dshr-org-2370 1 29 doing do VBG blog-dshr-org-2370 1 30 in in IN blog-dshr-org-2370 1 31 Digital Digital NNP blog-dshr-org-2370 1 32 Preservation Preservation NNP blog-dshr-org-2370 1 33 . . . blog-dshr-org-2370 2 1 Thursday Thursday NNP blog-dshr-org-2370 2 2 , , , blog-dshr-org-2370 2 3 July July NNP blog-dshr-org-2370 2 4 15 15 CD blog-dshr-org-2370 2 5 , , , blog-dshr-org-2370 2 6 2021 2021 CD blog-dshr-org-2370 2 7 A a DT blog-dshr-org-2370 2 8 Modest modest JJ blog-dshr-org-2370 2 9 Proposal proposal NN blog-dshr-org-2370 2 10 About about IN blog-dshr-org-2370 2 11 Ransomware Ransomware NNP blog-dshr-org-2370 2 12 On on IN blog-dshr-org-2370 2 13 the the DT blog-dshr-org-2370 2 14 evening evening NN blog-dshr-org-2370 2 15 of of IN blog-dshr-org-2370 2 16 July July NNP blog-dshr-org-2370 2 17 2nd 2nd NN blog-dshr-org-2370 2 18 the the DT blog-dshr-org-2370 2 19 REvil REvil NNP blog-dshr-org-2370 2 20 ransomware ransomware NN blog-dshr-org-2370 2 21 gang gang NN blog-dshr-org-2370 2 22 exploited exploit VBD blog-dshr-org-2370 2 23 a a DT blog-dshr-org-2370 2 24 0-day 0-day NNP blog-dshr-org-2370 2 25 vulnerability vulnerability NN blog-dshr-org-2370 2 26 to to TO blog-dshr-org-2370 2 27 launch launch VB blog-dshr-org-2370 2 28 a a DT blog-dshr-org-2370 2 29 supply supply NN blog-dshr-org-2370 2 30 chain chain NN blog-dshr-org-2370 2 31 attack attack NN blog-dshr-org-2370 2 32 on on IN blog-dshr-org-2370 2 33 customers customer NNS blog-dshr-org-2370 2 34 of of IN blog-dshr-org-2370 2 35 Kaseya Kaseya NNP blog-dshr-org-2370 2 36 's 's POS blog-dshr-org-2370 2 37 Virtual Virtual NNP blog-dshr-org-2370 2 38 System System NNP blog-dshr-org-2370 2 39 Administrator Administrator NNP blog-dshr-org-2370 2 40 ( ( -LRB- blog-dshr-org-2370 2 41 VSA VSA NNP blog-dshr-org-2370 2 42 ) ) -RRB- blog-dshr-org-2370 2 43 product product NN blog-dshr-org-2370 2 44 . . . blog-dshr-org-2370 3 1 The the DT blog-dshr-org-2370 3 2 timing timing NN blog-dshr-org-2370 3 3 was be VBD blog-dshr-org-2370 3 4 perfect perfect JJ blog-dshr-org-2370 3 5 , , , blog-dshr-org-2370 3 6 with with IN blog-dshr-org-2370 3 7 most most JJS blog-dshr-org-2370 3 8 system system NN blog-dshr-org-2370 3 9 administrators administrator NNS blog-dshr-org-2370 3 10 off off RP blog-dshr-org-2370 3 11 for for IN blog-dshr-org-2370 3 12 the the DT blog-dshr-org-2370 3 13 July July NNP blog-dshr-org-2370 3 14 4th 4th JJ blog-dshr-org-2370 3 15 long long JJ blog-dshr-org-2370 3 16 weekend weekend NN blog-dshr-org-2370 3 17 . . . blog-dshr-org-2370 4 1 By by IN blog-dshr-org-2370 4 2 the the DT blog-dshr-org-2370 4 3 6th 6th JJ blog-dshr-org-2370 4 4 Alex Alex NNP blog-dshr-org-2370 4 5 Marquardt Marquardt NNP blog-dshr-org-2370 4 6 reported report VBD blog-dshr-org-2370 4 7 that that IN blog-dshr-org-2370 4 8 Kaseya Kaseya NNP blog-dshr-org-2370 4 9 says say VBZ blog-dshr-org-2370 4 10 up up IN blog-dshr-org-2370 4 11 to to TO blog-dshr-org-2370 4 12 1,500 1,500 CD blog-dshr-org-2370 4 13 businesses business NNS blog-dshr-org-2370 4 14 compromised compromise VBN blog-dshr-org-2370 4 15 in in IN blog-dshr-org-2370 4 16 massive massive JJ blog-dshr-org-2370 4 17 ransomware ransomware NNP blog-dshr-org-2370 4 18 attack attack NN blog-dshr-org-2370 4 19 . . . blog-dshr-org-2370 5 1 REvil REvil NNP blog-dshr-org-2370 5 2 , , , blog-dshr-org-2370 5 3 which which WDT blog-dshr-org-2370 5 4 had have VBD blog-dshr-org-2370 5 5 previously previously RB blog-dshr-org-2370 5 6 extorted extort VBN blog-dshr-org-2370 5 7 $ $ $ blog-dshr-org-2370 5 8 11 11 CD blog-dshr-org-2370 5 9 M m NN blog-dshr-org-2370 5 10 from from IN blog-dshr-org-2370 5 11 meat meat NN blog-dshr-org-2370 5 12 giant giant JJ blog-dshr-org-2370 5 13 JBS JBS NNP blog-dshr-org-2370 5 14 , , , blog-dshr-org-2370 5 15 announced announce VBD blog-dshr-org-2370 5 16 that that IN blog-dshr-org-2370 5 17 for for IN blog-dshr-org-2370 5 18 the the DT blog-dshr-org-2370 5 19 low low JJ blog-dshr-org-2370 5 20 , , , blog-dshr-org-2370 5 21 low low JJ blog-dshr-org-2370 5 22 price price NN blog-dshr-org-2370 5 23 of of IN blog-dshr-org-2370 5 24 only only RB blog-dshr-org-2370 5 25 $ $ $ blog-dshr-org-2370 5 26 70 70 CD blog-dshr-org-2370 5 27 M m NN blog-dshr-org-2370 5 28 they -PRON- PRP blog-dshr-org-2370 5 29 would would MD blog-dshr-org-2370 5 30 provide provide VB blog-dshr-org-2370 5 31 everyone everyone NN blog-dshr-org-2370 5 32 with with IN blog-dshr-org-2370 5 33 a a DT blog-dshr-org-2370 5 34 decryptor decryptor NN blog-dshr-org-2370 5 35 . . . blog-dshr-org-2370 6 1 The the DT blog-dshr-org-2370 6 2 US US NNP blog-dshr-org-2370 6 3 government government NN blog-dshr-org-2370 6 4 's 's POS blog-dshr-org-2370 6 5 pathetic pathetic JJ blog-dshr-org-2370 6 6 response response NN blog-dshr-org-2370 6 7 is be VBZ blog-dshr-org-2370 6 8 to to TO blog-dshr-org-2370 6 9 tell tell VB blog-dshr-org-2370 6 10 the the DT blog-dshr-org-2370 6 11 intelligence intelligence NN blog-dshr-org-2370 6 12 agencies agency NNS blog-dshr-org-2370 6 13 to to TO blog-dshr-org-2370 6 14 investigate investigate VB blog-dshr-org-2370 6 15 and and CC blog-dshr-org-2370 6 16 to to TO blog-dshr-org-2370 6 17 beg beg VB blog-dshr-org-2370 6 18 Putin Putin NNP blog-dshr-org-2370 6 19 to to TO blog-dshr-org-2370 6 20 crack crack VB blog-dshr-org-2370 6 21 down down RP blog-dshr-org-2370 6 22 on on IN blog-dshr-org-2370 6 23 the the DT blog-dshr-org-2370 6 24 ransomware ransomware NN blog-dshr-org-2370 6 25 gangs gang NNS blog-dshr-org-2370 6 26 . . . blog-dshr-org-2370 7 1 Good good JJ blog-dshr-org-2370 7 2 luck luck NN blog-dshr-org-2370 7 3 with with IN blog-dshr-org-2370 7 4 that that DT blog-dshr-org-2370 7 5 ! ! . blog-dshr-org-2370 8 1 It -PRON- PRP blog-dshr-org-2370 8 2 is be VBZ blog-dshr-org-2370 8 3 n't not RB blog-dshr-org-2370 8 4 his -PRON- PRP$ blog-dshr-org-2370 8 5 problem problem NN blog-dshr-org-2370 8 6 , , , blog-dshr-org-2370 8 7 because because IN blog-dshr-org-2370 8 8 the the DT blog-dshr-org-2370 8 9 gangs gang NNS blog-dshr-org-2370 8 10 write write VBP blog-dshr-org-2370 8 11 their -PRON- PRP$ blog-dshr-org-2370 8 12 software software NN blog-dshr-org-2370 8 13 to to TO blog-dshr-org-2370 8 14 avoid avoid VB blog-dshr-org-2370 8 15 encrypting encrypt VBG blog-dshr-org-2370 8 16 systems system NNS blog-dshr-org-2370 8 17 that that WDT blog-dshr-org-2370 8 18 have have VBP blog-dshr-org-2370 8 19 default default NN blog-dshr-org-2370 8 20 languages language NNS blog-dshr-org-2370 8 21 from from IN blog-dshr-org-2370 8 22 the the DT blog-dshr-org-2370 8 23 former former JJ blog-dshr-org-2370 8 24 USSR USSR NNP blog-dshr-org-2370 8 25 . . . blog-dshr-org-2370 9 1 I -PRON- PRP blog-dshr-org-2370 9 2 've have VB blog-dshr-org-2370 9 3 writtten writtten VBN blog-dshr-org-2370 9 4 before before RB blog-dshr-org-2370 9 5 ( ( -LRB- blog-dshr-org-2370 9 6 here here RB blog-dshr-org-2370 9 7 , , , blog-dshr-org-2370 9 8 here here RB blog-dshr-org-2370 9 9 , , , blog-dshr-org-2370 9 10 here here RB blog-dshr-org-2370 9 11 ) ) -RRB- blog-dshr-org-2370 9 12 about about IN blog-dshr-org-2370 9 13 the the DT blog-dshr-org-2370 9 14 importance importance NN blog-dshr-org-2370 9 15 of of IN blog-dshr-org-2370 9 16 disrupting disrupt VBG blog-dshr-org-2370 9 17 the the DT blog-dshr-org-2370 9 18 cryptocurrency cryptocurrency NN blog-dshr-org-2370 9 19 payment payment NN blog-dshr-org-2370 9 20 channel channel NN blog-dshr-org-2370 9 21 that that WDT blog-dshr-org-2370 9 22 enables enable VBZ blog-dshr-org-2370 9 23 ransomware ransomware VBP blog-dshr-org-2370 9 24 , , , blog-dshr-org-2370 9 25 but but CC blog-dshr-org-2370 9 26 it -PRON- PRP blog-dshr-org-2370 9 27 looks look VBZ blog-dshr-org-2370 9 28 like like IN blog-dshr-org-2370 9 29 the the DT blog-dshr-org-2370 9 30 ransomware ransomware NNP blog-dshr-org-2370 9 31 crisis crisis NN blog-dshr-org-2370 9 32 has have VBZ blog-dshr-org-2370 9 33 to to TO blog-dshr-org-2370 9 34 get get VB blog-dshr-org-2370 9 35 a a DT blog-dshr-org-2370 9 36 great great JJ blog-dshr-org-2370 9 37 deal deal NN blog-dshr-org-2370 9 38 worse bad JJR blog-dshr-org-2370 9 39 before before IN blog-dshr-org-2370 9 40 effective effective JJ blog-dshr-org-2370 9 41 action action NN blog-dshr-org-2370 9 42 is be VBZ blog-dshr-org-2370 9 43 taken take VBN blog-dshr-org-2370 9 44 . . . blog-dshr-org-2370 10 1 Below below IN blog-dshr-org-2370 10 2 the the DT blog-dshr-org-2370 10 3 fold fold NN blog-dshr-org-2370 10 4 I -PRON- PRP blog-dshr-org-2370 10 5 lay lie VBD blog-dshr-org-2370 10 6 out out RP blog-dshr-org-2370 10 7 a a DT blog-dshr-org-2370 10 8 modest modest JJ blog-dshr-org-2370 10 9 proposal proposal NN blog-dshr-org-2370 10 10 that that WDT blog-dshr-org-2370 10 11 could could MD blog-dshr-org-2370 10 12 motivate motivate VB blog-dshr-org-2370 10 13 actions action NNS blog-dshr-org-2370 10 14 that that WDT blog-dshr-org-2370 10 15 would would MD blog-dshr-org-2370 10 16 greatly greatly RB blog-dshr-org-2370 10 17 reduce reduce VB blog-dshr-org-2370 10 18 the the DT blog-dshr-org-2370 10 19 risk risk NN blog-dshr-org-2370 10 20 . . . blog-dshr-org-2370 11 1 It -PRON- PRP blog-dshr-org-2370 11 2 turns turn VBZ blog-dshr-org-2370 11 3 out out RP blog-dshr-org-2370 11 4 that that IN blog-dshr-org-2370 11 5 the the DT blog-dshr-org-2370 11 6 vulnerability vulnerability NN blog-dshr-org-2370 11 7 that that WDT blog-dshr-org-2370 11 8 enabled enable VBD blog-dshr-org-2370 11 9 the the DT blog-dshr-org-2370 11 10 REvil REvil NNP blog-dshr-org-2370 11 11 attack attack NN blog-dshr-org-2370 11 12 did do VBD blog-dshr-org-2370 11 13 n't not RB blog-dshr-org-2370 11 14 meet meet VB blog-dshr-org-2370 11 15 the the DT blog-dshr-org-2370 11 16 strict strict JJ blog-dshr-org-2370 11 17 definition definition NN blog-dshr-org-2370 11 18 of of IN blog-dshr-org-2370 11 19 a a DT blog-dshr-org-2370 11 20 0-day 0-day NN blog-dshr-org-2370 11 21 . . . blog-dshr-org-2370 12 1 Gareth Gareth NNP blog-dshr-org-2370 12 2 Corfield Corfield NNP blog-dshr-org-2370 12 3 's 's POS blog-dshr-org-2370 12 4 White white JJ blog-dshr-org-2370 12 5 hats hat NNS blog-dshr-org-2370 12 6 reported report VBD blog-dshr-org-2370 12 7 key key JJ blog-dshr-org-2370 12 8 Kaseya Kaseya NNP blog-dshr-org-2370 12 9 VSA VSA NNP blog-dshr-org-2370 12 10 flaw flaw NN blog-dshr-org-2370 12 11 months month NNS blog-dshr-org-2370 12 12 ago ago RB blog-dshr-org-2370 12 13 . . . blog-dshr-org-2370 13 1 Ransomware Ransomware NNP blog-dshr-org-2370 13 2 outran outrun VBD blog-dshr-org-2370 13 3 the the DT blog-dshr-org-2370 13 4 patch patch NN blog-dshr-org-2370 13 5 explains explain VBZ blog-dshr-org-2370 13 6 : : : blog-dshr-org-2370 13 7 Rewind Rewind NNP blog-dshr-org-2370 13 8 to to IN blog-dshr-org-2370 13 9 April April NNP blog-dshr-org-2370 13 10 , , , blog-dshr-org-2370 13 11 and and CC blog-dshr-org-2370 13 12 the the DT blog-dshr-org-2370 13 13 Dutch Dutch NNP blog-dshr-org-2370 13 14 Institute Institute NNP blog-dshr-org-2370 13 15 for for IN blog-dshr-org-2370 13 16 Vulnerability Vulnerability NNP blog-dshr-org-2370 13 17 Disclosure Disclosure NNP blog-dshr-org-2370 13 18 ( ( -LRB- blog-dshr-org-2370 13 19 DIVD DIVD NNP blog-dshr-org-2370 13 20 ) ) -RRB- blog-dshr-org-2370 13 21 had have VBD blog-dshr-org-2370 13 22 privately privately RB blog-dshr-org-2370 13 23 reported report VBN blog-dshr-org-2370 13 24 seven seven CD blog-dshr-org-2370 13 25 security security NN blog-dshr-org-2370 13 26 bugs bug NNS blog-dshr-org-2370 13 27 in in IN blog-dshr-org-2370 13 28 VSA VSA NNP blog-dshr-org-2370 13 29 to to IN blog-dshr-org-2370 13 30 Kaseya Kaseya NNP blog-dshr-org-2370 13 31 . . . blog-dshr-org-2370 14 1 Four four CD blog-dshr-org-2370 14 2 were be VBD blog-dshr-org-2370 14 3 fixed fix VBN blog-dshr-org-2370 14 4 and and CC blog-dshr-org-2370 14 5 patches patch NNS blog-dshr-org-2370 14 6 released release VBN blog-dshr-org-2370 14 7 in in IN blog-dshr-org-2370 14 8 April April NNP blog-dshr-org-2370 14 9 and and CC blog-dshr-org-2370 14 10 May. May NNP blog-dshr-org-2370 15 1 Three three CD blog-dshr-org-2370 15 2 were be VBD blog-dshr-org-2370 15 3 due due JJ blog-dshr-org-2370 15 4 to to TO blog-dshr-org-2370 15 5 be be VB blog-dshr-org-2370 15 6 fixed fix VBN blog-dshr-org-2370 15 7 in in IN blog-dshr-org-2370 15 8 an an DT blog-dshr-org-2370 15 9 upcoming upcoming JJ blog-dshr-org-2370 15 10 release release NN blog-dshr-org-2370 15 11 , , , blog-dshr-org-2370 15 12 version version NN blog-dshr-org-2370 15 13 9.5.7 9.5.7 CD blog-dshr-org-2370 15 14 . . . blog-dshr-org-2370 16 1 Unfortunately unfortunately RB blog-dshr-org-2370 16 2 , , , blog-dshr-org-2370 16 3 one one CD blog-dshr-org-2370 16 4 of of IN blog-dshr-org-2370 16 5 those those DT blog-dshr-org-2370 16 6 unpatched unpatched JJ blog-dshr-org-2370 16 7 bugs bug NNS blog-dshr-org-2370 16 8 – – : blog-dshr-org-2370 16 9 CVE-2021 CVE-2021 NNP blog-dshr-org-2370 16 10 - - HYPH blog-dshr-org-2370 16 11 30116 30116 CD blog-dshr-org-2370 16 12 , , , blog-dshr-org-2370 16 13 a a DT blog-dshr-org-2370 16 14 credential credential NN blog-dshr-org-2370 16 15 - - HYPH blog-dshr-org-2370 16 16 leaking leak VBG blog-dshr-org-2370 16 17 logic logic NN blog-dshr-org-2370 16 18 flaw flaw NN blog-dshr-org-2370 16 19 discovered discover VBN blog-dshr-org-2370 16 20 by by IN blog-dshr-org-2370 16 21 DIVD DIVD NNP blog-dshr-org-2370 16 22 's 's POS blog-dshr-org-2370 16 23 Wietse Wietse NNP blog-dshr-org-2370 16 24 Boonstra Boonstra NNP blog-dshr-org-2370 16 25 – – : blog-dshr-org-2370 16 26 was be VBD blog-dshr-org-2370 16 27 exploited exploit VBN blog-dshr-org-2370 16 28 by by IN blog-dshr-org-2370 16 29 the the DT blog-dshr-org-2370 16 30 ransomware ransomware NN blog-dshr-org-2370 16 31 slingers slinger NNS blog-dshr-org-2370 16 32 before before IN blog-dshr-org-2370 16 33 its -PRON- PRP$ blog-dshr-org-2370 16 34 fix fix NN blog-dshr-org-2370 16 35 could could MD blog-dshr-org-2370 16 36 be be VB blog-dshr-org-2370 16 37 emitted emit VBN blog-dshr-org-2370 16 38 . . . blog-dshr-org-2370 17 1 DIVD DIVD NNP blog-dshr-org-2370 17 2 praised praise VBD blog-dshr-org-2370 17 3 Kaseya Kaseya NNP blog-dshr-org-2370 17 4 's 's POS blog-dshr-org-2370 17 5 response response NN blog-dshr-org-2370 17 6 : : : blog-dshr-org-2370 17 7 Once once RB blog-dshr-org-2370 17 8 Kaseya Kaseya NNP blog-dshr-org-2370 17 9 was be VBD blog-dshr-org-2370 17 10 aware aware JJ blog-dshr-org-2370 17 11 of of IN blog-dshr-org-2370 17 12 our -PRON- PRP$ blog-dshr-org-2370 17 13 reported report VBN blog-dshr-org-2370 17 14 vulnerabilities vulnerability NNS blog-dshr-org-2370 17 15 , , , blog-dshr-org-2370 17 16 we -PRON- PRP blog-dshr-org-2370 17 17 have have VBP blog-dshr-org-2370 17 18 been be VBN blog-dshr-org-2370 17 19 in in IN blog-dshr-org-2370 17 20 constant constant JJ blog-dshr-org-2370 17 21 contact contact NN blog-dshr-org-2370 17 22 and and CC blog-dshr-org-2370 17 23 cooperation cooperation NN blog-dshr-org-2370 17 24 with with IN blog-dshr-org-2370 17 25 them -PRON- PRP blog-dshr-org-2370 17 26 . . . blog-dshr-org-2370 18 1 When when WRB blog-dshr-org-2370 18 2 items item NNS blog-dshr-org-2370 18 3 in in IN blog-dshr-org-2370 18 4 our -PRON- PRP$ blog-dshr-org-2370 18 5 report report NN blog-dshr-org-2370 18 6 were be VBD blog-dshr-org-2370 18 7 unclear unclear JJ blog-dshr-org-2370 18 8 , , , blog-dshr-org-2370 18 9 they -PRON- PRP blog-dshr-org-2370 18 10 asked ask VBD blog-dshr-org-2370 18 11 the the DT blog-dshr-org-2370 18 12 right right JJ blog-dshr-org-2370 18 13 questions question NNS blog-dshr-org-2370 18 14 . . . blog-dshr-org-2370 19 1 Also also RB blog-dshr-org-2370 19 2 , , , blog-dshr-org-2370 19 3 partial partial JJ blog-dshr-org-2370 19 4 patches patch NNS blog-dshr-org-2370 19 5 were be VBD blog-dshr-org-2370 19 6 shared share VBN blog-dshr-org-2370 19 7 with with IN blog-dshr-org-2370 19 8 us -PRON- PRP blog-dshr-org-2370 19 9 to to TO blog-dshr-org-2370 19 10 validate validate VB blog-dshr-org-2370 19 11 their -PRON- PRP$ blog-dshr-org-2370 19 12 effectiveness effectiveness NN blog-dshr-org-2370 19 13 . . . blog-dshr-org-2370 20 1 During during IN blog-dshr-org-2370 20 2 the the DT blog-dshr-org-2370 20 3 entire entire JJ blog-dshr-org-2370 20 4 process process NN blog-dshr-org-2370 20 5 , , , blog-dshr-org-2370 20 6 Kaseya Kaseya NNP blog-dshr-org-2370 20 7 has have VBZ blog-dshr-org-2370 20 8 shown show VBN blog-dshr-org-2370 20 9 that that IN blog-dshr-org-2370 20 10 they -PRON- PRP blog-dshr-org-2370 20 11 were be VBD blog-dshr-org-2370 20 12 willing willing JJ blog-dshr-org-2370 20 13 to to TO blog-dshr-org-2370 20 14 put put VB blog-dshr-org-2370 20 15 in in IN blog-dshr-org-2370 20 16 the the DT blog-dshr-org-2370 20 17 maximum maximum JJ blog-dshr-org-2370 20 18 effort effort NN blog-dshr-org-2370 20 19 and and CC blog-dshr-org-2370 20 20 initiative initiative NN blog-dshr-org-2370 20 21 into into IN blog-dshr-org-2370 20 22 this this DT blog-dshr-org-2370 20 23 case case NN blog-dshr-org-2370 20 24 both both DT blog-dshr-org-2370 20 25 to to TO blog-dshr-org-2370 20 26 get get VB blog-dshr-org-2370 20 27 this this DT blog-dshr-org-2370 20 28 issue issue NN blog-dshr-org-2370 20 29 fixed fix VBN blog-dshr-org-2370 20 30 and and CC blog-dshr-org-2370 20 31 their -PRON- PRP$ blog-dshr-org-2370 20 32 customers customer NNS blog-dshr-org-2370 20 33 patched patch VBN blog-dshr-org-2370 20 34 . . . blog-dshr-org-2370 21 1 They -PRON- PRP blog-dshr-org-2370 21 2 showed show VBD blog-dshr-org-2370 21 3 a a DT blog-dshr-org-2370 21 4 genuine genuine JJ blog-dshr-org-2370 21 5 commitment commitment NN blog-dshr-org-2370 21 6 to to TO blog-dshr-org-2370 21 7 do do VB blog-dshr-org-2370 21 8 the the DT blog-dshr-org-2370 21 9 right right JJ blog-dshr-org-2370 21 10 thing thing NN blog-dshr-org-2370 21 11 . . . blog-dshr-org-2370 22 1 Unfortunately unfortunately RB blog-dshr-org-2370 22 2 , , , blog-dshr-org-2370 22 3 we -PRON- PRP blog-dshr-org-2370 22 4 were be VBD blog-dshr-org-2370 22 5 beaten beat VBN blog-dshr-org-2370 22 6 by by IN blog-dshr-org-2370 22 7 REvil REvil NNP blog-dshr-org-2370 22 8 in in IN blog-dshr-org-2370 22 9 the the DT blog-dshr-org-2370 22 10 final final JJ blog-dshr-org-2370 22 11 sprint sprint NN blog-dshr-org-2370 22 12 , , , blog-dshr-org-2370 22 13 as as IN blog-dshr-org-2370 22 14 they -PRON- PRP blog-dshr-org-2370 22 15 could could MD blog-dshr-org-2370 22 16 exploit exploit VB blog-dshr-org-2370 22 17 the the DT blog-dshr-org-2370 22 18 vulnerabilities vulnerability NNS blog-dshr-org-2370 22 19 before before IN blog-dshr-org-2370 22 20 customers customer NNS blog-dshr-org-2370 22 21 could could MD blog-dshr-org-2370 22 22 even even RB blog-dshr-org-2370 22 23 patch patch VB blog-dshr-org-2370 22 24 . . . blog-dshr-org-2370 23 1 But but CC blog-dshr-org-2370 23 2 if if IN blog-dshr-org-2370 23 3 Kaseya Kaseya NNP blog-dshr-org-2370 23 4 's 's POS blog-dshr-org-2370 23 5 response response NN blog-dshr-org-2370 23 6 to to IN blog-dshr-org-2370 23 7 DIVD DIVD NNP blog-dshr-org-2370 23 8 's 's POS blog-dshr-org-2370 23 9 disclosure disclosure NN blog-dshr-org-2370 23 10 was be VBD blog-dshr-org-2370 23 11 praisworthy praisworthy JJ blog-dshr-org-2370 23 12 , , , blog-dshr-org-2370 23 13 it -PRON- PRP blog-dshr-org-2370 23 14 turns turn VBZ blog-dshr-org-2370 23 15 out out RP blog-dshr-org-2370 23 16 it -PRON- PRP blog-dshr-org-2370 23 17 was be VBD blog-dshr-org-2370 23 18 the the DT blog-dshr-org-2370 23 19 exception exception NN blog-dshr-org-2370 23 20 . . . blog-dshr-org-2370 24 1 In in IN blog-dshr-org-2370 24 2 Kaseya Kaseya NNP blog-dshr-org-2370 24 3 was be VBD blog-dshr-org-2370 24 4 warned warn VBN blog-dshr-org-2370 24 5 about about IN blog-dshr-org-2370 24 6 security security NN blog-dshr-org-2370 24 7 flaws flaw NNS blog-dshr-org-2370 24 8 years year NNS blog-dshr-org-2370 24 9 ahead ahead RB blog-dshr-org-2370 24 10 of of IN blog-dshr-org-2370 24 11 ransomware ransomware JJ blog-dshr-org-2370 24 12 attack attack NN blog-dshr-org-2370 24 13 by by IN blog-dshr-org-2370 24 14 J. J. NNP blog-dshr-org-2370 24 15 , , , blog-dshr-org-2370 24 16 Fingas Fingas NNP blog-dshr-org-2370 24 17 reports report VBZ blog-dshr-org-2370 24 18 that that IN blog-dshr-org-2370 24 19 : : : blog-dshr-org-2370 24 20 The the DT blog-dshr-org-2370 24 21 giant giant JJ blog-dshr-org-2370 24 22 ransomware ransomware NN blog-dshr-org-2370 24 23 attack attack NN blog-dshr-org-2370 24 24 against against IN blog-dshr-org-2370 24 25 Kaseya Kaseya NNP blog-dshr-org-2370 24 26 might may MD blog-dshr-org-2370 24 27 have have VB blog-dshr-org-2370 24 28 been be VBN blog-dshr-org-2370 24 29 entirely entirely RB blog-dshr-org-2370 24 30 avoidable avoidable JJ blog-dshr-org-2370 24 31 . . . blog-dshr-org-2370 25 1 Former former JJ blog-dshr-org-2370 25 2 staff staff NN blog-dshr-org-2370 25 3 talking talk VBG blog-dshr-org-2370 25 4 to to IN blog-dshr-org-2370 25 5 Bloomberg Bloomberg NNP blog-dshr-org-2370 25 6 claim claim NN blog-dshr-org-2370 25 7 they -PRON- PRP blog-dshr-org-2370 25 8 warned warn VBD blog-dshr-org-2370 25 9 executives executive NNS blog-dshr-org-2370 25 10 of of IN blog-dshr-org-2370 25 11 " " `` blog-dshr-org-2370 25 12 critical critical JJ blog-dshr-org-2370 25 13 " " '' blog-dshr-org-2370 25 14 security security NN blog-dshr-org-2370 25 15 flaws flaw NNS blog-dshr-org-2370 25 16 in in IN blog-dshr-org-2370 25 17 Kaseya Kaseya NNP blog-dshr-org-2370 25 18 's 's POS blog-dshr-org-2370 25 19 products product NNS blog-dshr-org-2370 25 20 several several JJ blog-dshr-org-2370 25 21 times time NNS blog-dshr-org-2370 25 22 between between IN blog-dshr-org-2370 25 23 2017 2017 CD blog-dshr-org-2370 25 24 and and CC blog-dshr-org-2370 25 25 2020 2020 CD blog-dshr-org-2370 25 26 , , , blog-dshr-org-2370 25 27 but but CC blog-dshr-org-2370 25 28 that that IN blog-dshr-org-2370 25 29 the the DT blog-dshr-org-2370 25 30 company company NN blog-dshr-org-2370 25 31 did do VBD blog-dshr-org-2370 25 32 n't not RB blog-dshr-org-2370 25 33 truly truly RB blog-dshr-org-2370 25 34 address address VB blog-dshr-org-2370 25 35 them -PRON- PRP blog-dshr-org-2370 25 36 . . . blog-dshr-org-2370 26 1 Multiple multiple JJ blog-dshr-org-2370 26 2 staff staff NN blog-dshr-org-2370 26 3 either either CC blog-dshr-org-2370 26 4 quit quit VB blog-dshr-org-2370 26 5 or or CC blog-dshr-org-2370 26 6 said say VBD blog-dshr-org-2370 26 7 they -PRON- PRP blog-dshr-org-2370 26 8 were be VBD blog-dshr-org-2370 26 9 fired fire VBN blog-dshr-org-2370 26 10 over over IN blog-dshr-org-2370 26 11 inaction inaction NN blog-dshr-org-2370 26 12 . . . blog-dshr-org-2370 27 1 Employees employee NNS blog-dshr-org-2370 27 2 reportedly reportedly RB blog-dshr-org-2370 27 3 complained complain VBD blog-dshr-org-2370 27 4 that that IN blog-dshr-org-2370 27 5 Kaseya Kaseya NNP blog-dshr-org-2370 27 6 was be VBD blog-dshr-org-2370 27 7 using use VBG blog-dshr-org-2370 27 8 old old JJ blog-dshr-org-2370 27 9 code code NN blog-dshr-org-2370 27 10 , , , blog-dshr-org-2370 27 11 implemented implement VBD blog-dshr-org-2370 27 12 poor poor JJ blog-dshr-org-2370 27 13 encryption encryption NN blog-dshr-org-2370 27 14 and and CC blog-dshr-org-2370 27 15 even even RB blog-dshr-org-2370 27 16 failed fail VBD blog-dshr-org-2370 27 17 to to TO blog-dshr-org-2370 27 18 routinely routinely RB blog-dshr-org-2370 27 19 patch patch VB blog-dshr-org-2370 27 20 software software NN blog-dshr-org-2370 27 21 . . . blog-dshr-org-2370 28 1 The the DT blog-dshr-org-2370 28 2 company company NN blog-dshr-org-2370 28 3 's 's POS blog-dshr-org-2370 28 4 Virtual Virtual NNP blog-dshr-org-2370 28 5 System System NNP blog-dshr-org-2370 28 6 Administrator Administrator NNP blog-dshr-org-2370 28 7 ( ( -LRB- blog-dshr-org-2370 28 8 VSA VSA NNP blog-dshr-org-2370 28 9 ) ) -RRB- blog-dshr-org-2370 28 10 , , , blog-dshr-org-2370 28 11 the the DT blog-dshr-org-2370 28 12 remote remote JJ blog-dshr-org-2370 28 13 maintenance maintenance NN blog-dshr-org-2370 28 14 tool tool NN blog-dshr-org-2370 28 15 that that WDT blog-dshr-org-2370 28 16 fell fall VBD blog-dshr-org-2370 28 17 prey prey NN blog-dshr-org-2370 28 18 to to TO blog-dshr-org-2370 28 19 ransomware ransomware NNP blog-dshr-org-2370 28 20 , , , blog-dshr-org-2370 28 21 was be VBD blog-dshr-org-2370 28 22 supposedly supposedly RB blog-dshr-org-2370 28 23 rife rife JJ blog-dshr-org-2370 28 24 with with IN blog-dshr-org-2370 28 25 enough enough JJ blog-dshr-org-2370 28 26 problems problem NNS blog-dshr-org-2370 28 27 that that WDT blog-dshr-org-2370 28 28 workers worker NNS blog-dshr-org-2370 28 29 wanted want VBD blog-dshr-org-2370 28 30 the the DT blog-dshr-org-2370 28 31 software software NN blog-dshr-org-2370 28 32 replaced replace VBD blog-dshr-org-2370 28 33 . . . blog-dshr-org-2370 29 1 One one CD blog-dshr-org-2370 29 2 employee employee NN blog-dshr-org-2370 29 3 claimed claim VBD blog-dshr-org-2370 29 4 he -PRON- PRP blog-dshr-org-2370 29 5 was be VBD blog-dshr-org-2370 29 6 fired fire VBN blog-dshr-org-2370 29 7 two two CD blog-dshr-org-2370 29 8 weeks week NNS blog-dshr-org-2370 29 9 after after IN blog-dshr-org-2370 29 10 sending send VBG blog-dshr-org-2370 29 11 executives executive NNS blog-dshr-org-2370 29 12 a a DT blog-dshr-org-2370 29 13 40-page 40-page CD blog-dshr-org-2370 29 14 briefing briefing NN blog-dshr-org-2370 29 15 on on IN blog-dshr-org-2370 29 16 security security NN blog-dshr-org-2370 29 17 problems problem NNS blog-dshr-org-2370 29 18 . . . blog-dshr-org-2370 30 1 Others other NNS blog-dshr-org-2370 30 2 simply simply RB blog-dshr-org-2370 30 3 left leave VBD blog-dshr-org-2370 30 4 in in IN blog-dshr-org-2370 30 5 frustration frustration NN blog-dshr-org-2370 30 6 with with IN blog-dshr-org-2370 30 7 a a DT blog-dshr-org-2370 30 8 seeming seeming JJ blog-dshr-org-2370 30 9 focus focus NN blog-dshr-org-2370 30 10 on on IN blog-dshr-org-2370 30 11 new new JJ blog-dshr-org-2370 30 12 features feature NNS blog-dshr-org-2370 30 13 and and CC blog-dshr-org-2370 30 14 releases release NNS blog-dshr-org-2370 30 15 instead instead RB blog-dshr-org-2370 30 16 of of IN blog-dshr-org-2370 30 17 fixing fix VBG blog-dshr-org-2370 30 18 basic basic JJ blog-dshr-org-2370 30 19 issues issue NNS blog-dshr-org-2370 30 20 . . . blog-dshr-org-2370 31 1 Kaseya Kaseya NNP blog-dshr-org-2370 31 2 also also RB blog-dshr-org-2370 31 3 laid lay VBD blog-dshr-org-2370 31 4 off off RP blog-dshr-org-2370 31 5 some some DT blog-dshr-org-2370 31 6 employees employee NNS blog-dshr-org-2370 31 7 in in IN blog-dshr-org-2370 31 8 2018 2018 CD blog-dshr-org-2370 31 9 in in IN blog-dshr-org-2370 31 10 favor favor NN blog-dshr-org-2370 31 11 of of IN blog-dshr-org-2370 31 12 outsourcing outsource VBG blog-dshr-org-2370 31 13 work work NN blog-dshr-org-2370 31 14 to to IN blog-dshr-org-2370 31 15 Belarus Belarus NNP blog-dshr-org-2370 31 16 , , , blog-dshr-org-2370 31 17 which which WDT blog-dshr-org-2370 31 18 some some DT blog-dshr-org-2370 31 19 staff staff NN blog-dshr-org-2370 31 20 considered consider VBD blog-dshr-org-2370 31 21 a a DT blog-dshr-org-2370 31 22 security security NN blog-dshr-org-2370 31 23 risk risk NN blog-dshr-org-2370 31 24 given give VBN blog-dshr-org-2370 31 25 local local JJ blog-dshr-org-2370 31 26 leaders leader NNS blog-dshr-org-2370 31 27 ' ' POS blog-dshr-org-2370 31 28 partnerships partnership NNS blog-dshr-org-2370 31 29 with with IN blog-dshr-org-2370 31 30 the the DT blog-dshr-org-2370 31 31 Russian russian JJ blog-dshr-org-2370 31 32 government government NN blog-dshr-org-2370 31 33 . . . blog-dshr-org-2370 32 1 ... ... NFP blog-dshr-org-2370 33 1 The the DT blog-dshr-org-2370 33 2 company company NN blog-dshr-org-2370 33 3 's 's POS blog-dshr-org-2370 33 4 software software NN blog-dshr-org-2370 33 5 was be VBD blog-dshr-org-2370 33 6 reportedly reportedly RB blog-dshr-org-2370 33 7 used use VBN blog-dshr-org-2370 33 8 to to TO blog-dshr-org-2370 33 9 launch launch VB blog-dshr-org-2370 33 10 ransomware ransomware NNP blog-dshr-org-2370 33 11 at at IN blog-dshr-org-2370 33 12 least least JJS blog-dshr-org-2370 33 13 twice twice RB blog-dshr-org-2370 33 14 between between IN blog-dshr-org-2370 33 15 2018 2018 CD blog-dshr-org-2370 33 16 and and CC blog-dshr-org-2370 33 17 2019 2019 CD blog-dshr-org-2370 33 18 , , , blog-dshr-org-2370 33 19 and and CC blog-dshr-org-2370 33 20 it -PRON- PRP blog-dshr-org-2370 33 21 did do VBD blog-dshr-org-2370 33 22 n't not RB blog-dshr-org-2370 33 23 significantly significantly RB blog-dshr-org-2370 33 24 rethink rethink VB blog-dshr-org-2370 33 25 its -PRON- PRP$ blog-dshr-org-2370 33 26 security security NN blog-dshr-org-2370 33 27 strategy strategy NN blog-dshr-org-2370 33 28 . . . blog-dshr-org-2370 34 1 To to TO blog-dshr-org-2370 34 2 reiterate reiterate VB blog-dshr-org-2370 34 3 : : : blog-dshr-org-2370 34 4 The the DT blog-dshr-org-2370 34 5 July July NNP blog-dshr-org-2370 34 6 2nd 2nd NN blog-dshr-org-2370 34 7 attack attack NN blog-dshr-org-2370 34 8 was be VBD blog-dshr-org-2370 34 9 apparently apparently RB blog-dshr-org-2370 34 10 at at IN blog-dshr-org-2370 34 11 least least JJS blog-dshr-org-2370 34 12 the the DT blog-dshr-org-2370 34 13 third third JJ blog-dshr-org-2370 34 14 time time NN blog-dshr-org-2370 34 15 Kaseya Kaseya NNP blog-dshr-org-2370 34 16 had have VBD blog-dshr-org-2370 34 17 infected infect VBN blog-dshr-org-2370 34 18 customers customer NNS blog-dshr-org-2370 34 19 with with IN blog-dshr-org-2370 34 20 ransomware ransomware NN blog-dshr-org-2370 34 21 ! ! . blog-dshr-org-2370 35 1 Kaseya Kaseya NNP blog-dshr-org-2370 35 2 outsourced outsource VBD blog-dshr-org-2370 35 3 development development NN blog-dshr-org-2370 35 4 to to IN blog-dshr-org-2370 35 5 Belarus Belarus NNP blog-dshr-org-2370 35 6 , , , blog-dshr-org-2370 35 7 a a DT blog-dshr-org-2370 35 8 country country NN blog-dshr-org-2370 35 9 where where WRB blog-dshr-org-2370 35 10 ransomware ransomware NN blog-dshr-org-2370 35 11 gangs gang NNS blog-dshr-org-2370 35 12 have have VBP blog-dshr-org-2370 35 13 immunity immunity NN blog-dshr-org-2370 35 14 ! ! . blog-dshr-org-2370 35 15 . . . blog-dshr-org-2370 36 1 Kaseya Kaseya NNP blog-dshr-org-2370 36 2 fired fire VBD blog-dshr-org-2370 36 3 security security NN blog-dshr-org-2370 36 4 whistleblowers whistleblower NNS blog-dshr-org-2370 36 5 ! ! . blog-dshr-org-2370 37 1 The the DT blog-dshr-org-2370 37 2 first first JJ blog-dshr-org-2370 37 3 two two CD blog-dshr-org-2370 37 4 incidents incident NNS blog-dshr-org-2370 37 5 did do VBD blog-dshr-org-2370 37 6 n't not RB blog-dshr-org-2370 37 7 seem seem VB blog-dshr-org-2370 37 8 to to TO blog-dshr-org-2370 37 9 make make VB blog-dshr-org-2370 37 10 either either DT blog-dshr-org-2370 37 11 Kaseya Kaseya NNP blog-dshr-org-2370 37 12 or or CC blog-dshr-org-2370 37 13 its -PRON- PRP$ blog-dshr-org-2370 37 14 customers customer NNS blog-dshr-org-2370 37 15 re re VB blog-dshr-org-2370 37 16 - - NN blog-dshr-org-2370 37 17 think think VBP blog-dshr-org-2370 37 18 what what WP blog-dshr-org-2370 37 19 they -PRON- PRP blog-dshr-org-2370 37 20 were be VBD blog-dshr-org-2370 37 21 doing do VBG blog-dshr-org-2370 37 22 . . . blog-dshr-org-2370 38 1 Clearly clearly RB blog-dshr-org-2370 38 2 , , , blog-dshr-org-2370 38 3 the the DT blog-dshr-org-2370 38 4 only only JJ blog-dshr-org-2370 38 5 reason reason NN blog-dshr-org-2370 38 6 Kaseya Kaseya NNP blog-dshr-org-2370 38 7 responded respond VBD blog-dshr-org-2370 38 8 to to IN blog-dshr-org-2370 38 9 DIVD DIVD NNP blog-dshr-org-2370 38 10 's 's POS blog-dshr-org-2370 38 11 warning warning NN blog-dshr-org-2370 38 12 was be VBD blog-dshr-org-2370 38 13 the the DT blog-dshr-org-2370 38 14 threat threat NN blog-dshr-org-2370 38 15 of of IN blog-dshr-org-2370 38 16 public public JJ blog-dshr-org-2370 38 17 disclosure disclosure NN blog-dshr-org-2370 38 18 . . . blog-dshr-org-2370 39 1 Without without IN blog-dshr-org-2370 39 2 effective effective JJ blog-dshr-org-2370 39 3 action action NN blog-dshr-org-2370 39 4 to to TO blog-dshr-org-2370 39 5 change change VB blog-dshr-org-2370 39 6 this this DT blog-dshr-org-2370 39 7 attitude attitude NN blog-dshr-org-2370 39 8 the the DT blog-dshr-org-2370 39 9 ransomware ransomware JJ blog-dshr-org-2370 39 10 crisis crisis NN blog-dshr-org-2370 39 11 will will MD blog-dshr-org-2370 39 12 definitely definitely RB blog-dshr-org-2370 39 13 result result VB blog-dshr-org-2370 39 14 in in IN blog-dshr-org-2370 39 15 what what WP blog-dshr-org-2370 39 16 Stephen Stephen NNP blog-dshr-org-2370 39 17 Diehl Diehl NNP blog-dshr-org-2370 39 18 calls call VBZ blog-dshr-org-2370 39 19 The the DT blog-dshr-org-2370 39 20 Oncoming oncoming JJ blog-dshr-org-2370 39 21 Ransomware ransomware NN blog-dshr-org-2370 39 22 Storm storm NN blog-dshr-org-2370 39 23 : : : blog-dshr-org-2370 39 24 Imagine imagine VB blog-dshr-org-2370 39 25 a a DT blog-dshr-org-2370 39 26 hundred hundred CD blog-dshr-org-2370 39 27 new new JJ blog-dshr-org-2370 39 28 Stuxnet stuxnet NN blog-dshr-org-2370 39 29 - - HYPH blog-dshr-org-2370 39 30 level level NN blog-dshr-org-2370 39 31 exploits exploit NNS blog-dshr-org-2370 39 32 every every DT blog-dshr-org-2370 39 33 day day NN blog-dshr-org-2370 39 34 , , , blog-dshr-org-2370 39 35 for for IN blog-dshr-org-2370 39 36 every every DT blog-dshr-org-2370 39 37 piece piece NN blog-dshr-org-2370 39 38 of of IN blog-dshr-org-2370 39 39 a a DT blog-dshr-org-2370 39 40 equipment equipment NN blog-dshr-org-2370 39 41 in in IN blog-dshr-org-2370 39 42 public public JJ blog-dshr-org-2370 39 43 works work NNS blog-dshr-org-2370 39 44 and and CC blog-dshr-org-2370 39 45 health health NN blog-dshr-org-2370 39 46 care care NN blog-dshr-org-2370 39 47 . . . blog-dshr-org-2370 40 1 Where where WRB blog-dshr-org-2370 40 2 every every DT blog-dshr-org-2370 40 3 day day NN blog-dshr-org-2370 40 4 your -PRON- PRP$ blog-dshr-org-2370 40 5 check check VB blog-dshr-org-2370 40 6 your -PRON- PRP$ blog-dshr-org-2370 40 7 phone phone NN blog-dshr-org-2370 40 8 for for IN blog-dshr-org-2370 40 9 the the DT blog-dshr-org-2370 40 10 level level NN blog-dshr-org-2370 40 11 of of IN blog-dshr-org-2370 40 12 ransomware ransomware NN blog-dshr-org-2370 40 13 in in IN blog-dshr-org-2370 40 14 the the DT blog-dshr-org-2370 40 15 wild wild NN blog-dshr-org-2370 40 16 just just RB blog-dshr-org-2370 40 17 like like IN blog-dshr-org-2370 40 18 you -PRON- PRP blog-dshr-org-2370 40 19 do do VBP blog-dshr-org-2370 40 20 the the DT blog-dshr-org-2370 40 21 weather weather NN blog-dshr-org-2370 40 22 . . . blog-dshr-org-2370 41 1 Entire entire JJ blog-dshr-org-2370 41 2 cities city NNS blog-dshr-org-2370 41 3 randomly randomly RB blog-dshr-org-2370 41 4 have have VB blog-dshr-org-2370 41 5 their -PRON- PRP$ blog-dshr-org-2370 41 6 metro metro NN blog-dshr-org-2370 41 7 systems system NNS blog-dshr-org-2370 41 8 , , , blog-dshr-org-2370 41 9 water water NN blog-dshr-org-2370 41 10 , , , blog-dshr-org-2370 41 11 power power NN blog-dshr-org-2370 41 12 grids grid NNS blog-dshr-org-2370 41 13 and and CC blog-dshr-org-2370 41 14 internet internet NN blog-dshr-org-2370 41 15 shut shut VBD blog-dshr-org-2370 41 16 off off RP blog-dshr-org-2370 41 17 and and CC blog-dshr-org-2370 41 18 on on RB blog-dshr-org-2370 41 19 like like UH blog-dshr-org-2370 41 20 a a DT blog-dshr-org-2370 41 21 sudden sudden JJ blog-dshr-org-2370 41 22 onset onset NN blog-dshr-org-2370 41 23 of of IN blog-dshr-org-2370 41 24 bad bad JJ blog-dshr-org-2370 41 25 cybersecurity cybersecurity NN blog-dshr-org-2370 41 26 “ " `` blog-dshr-org-2370 41 27 weather weather NN blog-dshr-org-2370 41 28 ” " '' blog-dshr-org-2370 41 29 . . . blog-dshr-org-2370 42 1 Or or CC blog-dshr-org-2370 42 2 a a DT blog-dshr-org-2370 42 3 time time NN blog-dshr-org-2370 42 4 in in IN blog-dshr-org-2370 42 5 business business NN blog-dshr-org-2370 42 6 in in IN blog-dshr-org-2370 42 7 which which WDT blog-dshr-org-2370 42 8 every every DT blog-dshr-org-2370 42 9 company company NN blog-dshr-org-2370 42 10 simply simply RB blog-dshr-org-2370 42 11 just just RB blog-dshr-org-2370 42 12 allocates allocate VBZ blog-dshr-org-2370 42 13 a a DT blog-dshr-org-2370 42 14 portion portion NN blog-dshr-org-2370 42 15 of of IN blog-dshr-org-2370 42 16 its -PRON- PRP$ blog-dshr-org-2370 42 17 earnings earning NNS blog-dshr-org-2370 42 18 upfront upfront NN blog-dshr-org-2370 42 19 every every DT blog-dshr-org-2370 42 20 quarter quarter NN blog-dshr-org-2370 42 21 and and CC blog-dshr-org-2370 42 22 pre pre NNS blog-dshr-org-2370 42 23 - - JJ blog-dshr-org-2370 42 24 pays pay VBZ blog-dshr-org-2370 42 25 off off RP blog-dshr-org-2370 42 26 large large JJ blog-dshr-org-2370 42 27 ransomware ransomware NN blog-dshr-org-2370 42 28 groups group NNS blog-dshr-org-2370 42 29 in in IN blog-dshr-org-2370 42 30 advance advance NN blog-dshr-org-2370 42 31 . . . blog-dshr-org-2370 43 1 It -PRON- PRP blog-dshr-org-2370 43 2 ’s ’ VBZ blog-dshr-org-2370 43 3 just just RB blog-dshr-org-2370 43 4 a a DT blog-dshr-org-2370 43 5 universal universal JJ blog-dshr-org-2370 43 6 cost cost NN blog-dshr-org-2370 43 7 of of IN blog-dshr-org-2370 43 8 doing do VBG blog-dshr-org-2370 43 9 business business NN blog-dshr-org-2370 43 10 and and CC blog-dshr-org-2370 43 11 one one NN blog-dshr-org-2370 43 12 that that WDT blog-dshr-org-2370 43 13 is be VBZ blog-dshr-org-2370 43 14 fully fully RB blog-dshr-org-2370 43 15 sanctioned sanction VBN blog-dshr-org-2370 43 16 by by IN blog-dshr-org-2370 43 17 the the DT blog-dshr-org-2370 43 18 government government NN blog-dshr-org-2370 43 19 because because IN blog-dshr-org-2370 43 20 we -PRON- PRP blog-dshr-org-2370 43 21 ’ve have VB blog-dshr-org-2370 43 22 all all DT blog-dshr-org-2370 43 23 just just RB blog-dshr-org-2370 43 24 given give VBN blog-dshr-org-2370 43 25 up up RP blog-dshr-org-2370 43 26 trying try VBG blog-dshr-org-2370 43 27 to to TO blog-dshr-org-2370 43 28 prevent prevent VB blog-dshr-org-2370 43 29 it -PRON- PRP blog-dshr-org-2370 43 30 and and CC blog-dshr-org-2370 43 31 it -PRON- PRP blog-dshr-org-2370 43 32 ’s ’ VBZ blog-dshr-org-2370 43 33 more more RBR blog-dshr-org-2370 43 34 efficient efficient JJ blog-dshr-org-2370 43 35 just just RB blog-dshr-org-2370 43 36 to to TO blog-dshr-org-2370 43 37 pay pay VB blog-dshr-org-2370 43 38 the the DT blog-dshr-org-2370 43 39 protection protection NN blog-dshr-org-2370 43 40 racket racket NN blog-dshr-org-2370 43 41 . . . blog-dshr-org-2370 44 1 To to TO blog-dshr-org-2370 44 2 make make VB blog-dshr-org-2370 44 3 things thing NNS blog-dshr-org-2370 44 4 worse bad JJR blog-dshr-org-2370 44 5 , , , blog-dshr-org-2370 44 6 companies company NNS blog-dshr-org-2370 44 7 can can MD blog-dshr-org-2370 44 8 insure insure VB blog-dshr-org-2370 44 9 against against IN blog-dshr-org-2370 44 10 the the DT blog-dshr-org-2370 44 11 risk risk NN blog-dshr-org-2370 44 12 of of IN blog-dshr-org-2370 44 13 ransomware ransomware NN blog-dshr-org-2370 44 14 , , , blog-dshr-org-2370 44 15 essentially essentially RB blog-dshr-org-2370 44 16 paying pay VBG blog-dshr-org-2370 44 17 to to TO blog-dshr-org-2370 44 18 avoid avoid VB blog-dshr-org-2370 44 19 the the DT blog-dshr-org-2370 44 20 hassle hassle NN blog-dshr-org-2370 44 21 of of IN blog-dshr-org-2370 44 22 maintaining maintain VBG blog-dshr-org-2370 44 23 security security NN blog-dshr-org-2370 44 24 . . . blog-dshr-org-2370 45 1 Insurance insurance NN blog-dshr-org-2370 45 2 companies company NNS blog-dshr-org-2370 45 3 ca can MD blog-dshr-org-2370 45 4 n't not RB blog-dshr-org-2370 45 5 price price VB blog-dshr-org-2370 45 6 these these DT blog-dshr-org-2370 45 7 policies policy NNS blog-dshr-org-2370 45 8 properly properly RB blog-dshr-org-2370 45 9 , , , blog-dshr-org-2370 45 10 because because IN blog-dshr-org-2370 45 11 they -PRON- PRP blog-dshr-org-2370 45 12 ca can MD blog-dshr-org-2370 45 13 n't not RB blog-dshr-org-2370 45 14 do do VB blog-dshr-org-2370 45 15 enough enough JJ blog-dshr-org-2370 45 16 underwriting underwriting NN blog-dshr-org-2370 45 17 to to TO blog-dshr-org-2370 45 18 know know VB blog-dshr-org-2370 45 19 , , , blog-dshr-org-2370 45 20 for for IN blog-dshr-org-2370 45 21 example example NN blog-dshr-org-2370 45 22 , , , blog-dshr-org-2370 45 23 whether whether IN blog-dshr-org-2370 45 24 the the DT blog-dshr-org-2370 45 25 customer customer NN blog-dshr-org-2370 45 26 's 's POS blog-dshr-org-2370 45 27 backups backup NNS blog-dshr-org-2370 45 28 actually actually RB blog-dshr-org-2370 45 29 work work VBP blog-dshr-org-2370 45 30 and and CC blog-dshr-org-2370 45 31 whether whether IN blog-dshr-org-2370 45 32 they -PRON- PRP blog-dshr-org-2370 45 33 are be VBP blog-dshr-org-2370 45 34 offline offline JJ blog-dshr-org-2370 45 35 enough enough RB blog-dshr-org-2370 45 36 so so IN blog-dshr-org-2370 45 37 the the DT blog-dshr-org-2370 45 38 ransomware ransomware NN blog-dshr-org-2370 45 39 does do VBZ blog-dshr-org-2370 45 40 n't not RB blog-dshr-org-2370 45 41 encrypt encrypt VB blog-dshr-org-2370 45 42 them -PRON- PRP blog-dshr-org-2370 45 43 too too RB blog-dshr-org-2370 45 44 . . . blog-dshr-org-2370 46 1 In in IN blog-dshr-org-2370 46 2 Cyber Cyber NNP blog-dshr-org-2370 46 3 insurance insurance NN blog-dshr-org-2370 46 4 model model NN blog-dshr-org-2370 46 5 is be VBZ blog-dshr-org-2370 46 6 broken break VBN blog-dshr-org-2370 46 7 , , , blog-dshr-org-2370 46 8 consider consider VB blog-dshr-org-2370 46 9 banning ban VBG blog-dshr-org-2370 46 10 ransomware ransomware NN blog-dshr-org-2370 46 11 payments payment NNS blog-dshr-org-2370 46 12 , , , blog-dshr-org-2370 46 13 says say VBZ blog-dshr-org-2370 46 14 think think VB blog-dshr-org-2370 46 15 tank tank NN blog-dshr-org-2370 46 16 Gareth Gareth NNP blog-dshr-org-2370 46 17 Corfield Corfield NNP blog-dshr-org-2370 46 18 reports report VBZ blog-dshr-org-2370 46 19 on on IN blog-dshr-org-2370 46 20 the the DT blog-dshr-org-2370 46 21 Royal Royal NNP blog-dshr-org-2370 46 22 United United NNP blog-dshr-org-2370 46 23 Services Services NNP blog-dshr-org-2370 46 24 Institute Institute NNP blog-dshr-org-2370 46 25 's 's POS blog-dshr-org-2370 46 26 ( ( -LRB- blog-dshr-org-2370 46 27 RUSI RUSI NNP blog-dshr-org-2370 46 28 ) ) -RRB- blog-dshr-org-2370 46 29 latest late JJS blog-dshr-org-2370 46 30 report report NN blog-dshr-org-2370 46 31 , , , blog-dshr-org-2370 46 32 Cyber Cyber NNP blog-dshr-org-2370 46 33 Insurance Insurance NNP blog-dshr-org-2370 46 34 and and CC blog-dshr-org-2370 46 35 the the DT blog-dshr-org-2370 46 36 Cyber Cyber NNP blog-dshr-org-2370 46 37 Security Security NNP blog-dshr-org-2370 46 38 Challenge Challenge NNP blog-dshr-org-2370 46 39 : : : blog-dshr-org-2370 46 40 Unfortunately unfortunately RB blog-dshr-org-2370 46 41 , , , blog-dshr-org-2370 46 42 RUSI RUSI NNP blog-dshr-org-2370 46 43 's 's POS blog-dshr-org-2370 46 44 researchers researcher NNS blog-dshr-org-2370 46 45 found find VBD blog-dshr-org-2370 46 46 that that IN blog-dshr-org-2370 46 47 insurers insurer NNS blog-dshr-org-2370 46 48 tend tend VBP blog-dshr-org-2370 46 49 to to TO blog-dshr-org-2370 46 50 sell sell VB blog-dshr-org-2370 46 51 cyber cyber JJ blog-dshr-org-2370 46 52 policies policy NNS blog-dshr-org-2370 46 53 with with IN blog-dshr-org-2370 46 54 minimal minimal JJ blog-dshr-org-2370 46 55 due due JJ blog-dshr-org-2370 46 56 diligence diligence NN blog-dshr-org-2370 46 57 – – : blog-dshr-org-2370 46 58 and and CC blog-dshr-org-2370 46 59 when when WRB blog-dshr-org-2370 46 60 the the DT blog-dshr-org-2370 46 61 claims claim NNS blog-dshr-org-2370 46 62 start start VBP blog-dshr-org-2370 46 63 rolling roll VBG blog-dshr-org-2370 46 64 in in IN blog-dshr-org-2370 46 65 , , , blog-dshr-org-2370 46 66 insurance insurance NN blog-dshr-org-2370 46 67 company company NN blog-dshr-org-2370 46 68 managers manager NNS blog-dshr-org-2370 46 69 start start VBP blog-dshr-org-2370 46 70 looking look VBG blog-dshr-org-2370 46 71 at at IN blog-dshr-org-2370 46 72 ways way NNS blog-dshr-org-2370 46 73 to to TO blog-dshr-org-2370 46 74 escape escape VB blog-dshr-org-2370 46 75 an an DT blog-dshr-org-2370 46 76 unprofitable unprofitable JJ blog-dshr-org-2370 46 77 line line NN blog-dshr-org-2370 46 78 of of IN blog-dshr-org-2370 46 79 business business NN blog-dshr-org-2370 46 80 . . . blog-dshr-org-2370 47 1 ... ... NFP blog-dshr-org-2370 47 2 RUSI RUSI NNP blog-dshr-org-2370 47 3 's 's POS blog-dshr-org-2370 47 4 position position NN blog-dshr-org-2370 47 5 on on IN blog-dshr-org-2370 47 6 buying buy VBG blog-dshr-org-2370 47 7 off off RP blog-dshr-org-2370 47 8 criminals criminal NNS blog-dshr-org-2370 47 9 is be VBZ blog-dshr-org-2370 47 10 unequivocal unequivocal JJ blog-dshr-org-2370 47 11 , , , blog-dshr-org-2370 47 12 with with IN blog-dshr-org-2370 47 13 [ [ -LRB- blog-dshr-org-2370 47 14 Jason Jason NNP blog-dshr-org-2370 47 15 ] ] -RRB- blog-dshr-org-2370 47 16 Nurse Nurse NNP blog-dshr-org-2370 47 17 and and CC blog-dshr-org-2370 47 18 co co NNS blog-dshr-org-2370 47 19 - - NNS blog-dshr-org-2370 47 20 authors author NNS blog-dshr-org-2370 47 21 Jamie Jamie NNP blog-dshr-org-2370 47 22 MacColl MacColl NNP blog-dshr-org-2370 47 23 and and CC blog-dshr-org-2370 47 24 James James NNP blog-dshr-org-2370 47 25 Sullivan Sullivan NNP blog-dshr-org-2370 47 26 saying say VBG blog-dshr-org-2370 47 27 in in IN blog-dshr-org-2370 47 28 their -PRON- PRP$ blog-dshr-org-2370 47 29 report report NN blog-dshr-org-2370 47 30 that that IN blog-dshr-org-2370 47 31 the the DT blog-dshr-org-2370 47 32 UK UK NNP blog-dshr-org-2370 47 33 's 's POS blog-dshr-org-2370 47 34 National National NNP blog-dshr-org-2370 47 35 Security Security NNP blog-dshr-org-2370 47 36 Secretariat Secretariat NNP blog-dshr-org-2370 47 37 " " '' blog-dshr-org-2370 47 38 should should MD blog-dshr-org-2370 47 39 conduct conduct VB blog-dshr-org-2370 47 40 an an DT blog-dshr-org-2370 47 41 urgent urgent JJ blog-dshr-org-2370 47 42 policy policy NN blog-dshr-org-2370 47 43 review review NN blog-dshr-org-2370 47 44 into into IN blog-dshr-org-2370 47 45 the the DT blog-dshr-org-2370 47 46 feasibility feasibility NN blog-dshr-org-2370 47 47 and and CC blog-dshr-org-2370 47 48 suitability suitability NN blog-dshr-org-2370 47 49 of of IN blog-dshr-org-2370 47 50 banning ban VBG blog-dshr-org-2370 47 51 ransom ransom NN blog-dshr-org-2370 47 52 payments payment NNS blog-dshr-org-2370 47 53 . . . blog-dshr-org-2370 47 54 " " '' blog-dshr-org-2370 48 1 The the DT blog-dshr-org-2370 48 2 fundamental fundamental JJ blog-dshr-org-2370 48 3 problem problem NN blog-dshr-org-2370 48 4 is be VBZ blog-dshr-org-2370 48 5 that that IN blog-dshr-org-2370 48 6 neither neither CC blog-dshr-org-2370 48 7 the the DT blog-dshr-org-2370 48 8 software software NN blog-dshr-org-2370 48 9 vendors vendor NNS blog-dshr-org-2370 48 10 nor nor CC blog-dshr-org-2370 48 11 the the DT blog-dshr-org-2370 48 12 insurers insurer NNS blog-dshr-org-2370 48 13 nor nor CC blog-dshr-org-2370 48 14 their -PRON- PRP$ blog-dshr-org-2370 48 15 customers customer NNS blog-dshr-org-2370 48 16 are be VBP blog-dshr-org-2370 48 17 taking take VBG blog-dshr-org-2370 48 18 security security NN blog-dshr-org-2370 48 19 seriously seriously RB blog-dshr-org-2370 48 20 enough enough RB blog-dshr-org-2370 48 21 because because IN blog-dshr-org-2370 48 22 it -PRON- PRP blog-dshr-org-2370 48 23 is be VBZ blog-dshr-org-2370 48 24 n't not RB blog-dshr-org-2370 48 25 a a DT blog-dshr-org-2370 48 26 big big JJ blog-dshr-org-2370 48 27 enough enough JJ blog-dshr-org-2370 48 28 crisis crisis NN blog-dshr-org-2370 48 29 yet yet RB blog-dshr-org-2370 48 30 . . . blog-dshr-org-2370 49 1 The the DT blog-dshr-org-2370 49 2 solution solution NN blog-dshr-org-2370 49 3 ? ? . blog-dshr-org-2370 50 1 Take take VB blog-dshr-org-2370 50 2 control control NN blog-dshr-org-2370 50 3 of of IN blog-dshr-org-2370 50 4 the the DT blog-dshr-org-2370 50 5 crisis crisis NN blog-dshr-org-2370 50 6 and and CC blog-dshr-org-2370 50 7 make make VB blog-dshr-org-2370 50 8 it -PRON- PRP blog-dshr-org-2370 50 9 big big JJ blog-dshr-org-2370 50 10 enough enough RB blog-dshr-org-2370 50 11 that that IN blog-dshr-org-2370 50 12 security security NN blog-dshr-org-2370 50 13 gets get VBZ blog-dshr-org-2370 50 14 taken take VBN blog-dshr-org-2370 50 15 seriously seriously RB blog-dshr-org-2370 50 16 . . . blog-dshr-org-2370 51 1 The the DT blog-dshr-org-2370 51 2 US US NNP blog-dshr-org-2370 51 3 always always RB blog-dshr-org-2370 51 4 claims claim VBZ blog-dshr-org-2370 51 5 to to TO blog-dshr-org-2370 51 6 have have VB blog-dshr-org-2370 51 7 the the DT blog-dshr-org-2370 51 8 best good JJS blog-dshr-org-2370 51 9 cyber cyber JJ blog-dshr-org-2370 51 10 - - HYPH blog-dshr-org-2370 51 11 warfare warfare NN blog-dshr-org-2370 51 12 capability capability NN blog-dshr-org-2370 51 13 on on IN blog-dshr-org-2370 51 14 the the DT blog-dshr-org-2370 51 15 planet planet NN blog-dshr-org-2370 51 16 , , , blog-dshr-org-2370 51 17 so so RB blog-dshr-org-2370 51 18 presumably presumably RB blog-dshr-org-2370 51 19 they -PRON- PRP blog-dshr-org-2370 51 20 could could MD blog-dshr-org-2370 51 21 do do VB blog-dshr-org-2370 51 22 ransomware ransomware VB blog-dshr-org-2370 51 23 better well RBR blog-dshr-org-2370 51 24 and and CC blog-dshr-org-2370 51 25 faster fast RBR blog-dshr-org-2370 51 26 than than IN blog-dshr-org-2370 51 27 gangs gang NNS blog-dshr-org-2370 51 28 like like IN blog-dshr-org-2370 51 29 REvil REvil NNP blog-dshr-org-2370 51 30 . . . blog-dshr-org-2370 52 1 The the DT blog-dshr-org-2370 52 2 US US NNP blog-dshr-org-2370 52 3 should should MD blog-dshr-org-2370 52 4 use use VB blog-dshr-org-2370 52 5 this this DT blog-dshr-org-2370 52 6 capability capability NN blog-dshr-org-2370 52 7 to to TO blog-dshr-org-2370 52 8 mount mount VB blog-dshr-org-2370 52 9 ransomware ransomware NN blog-dshr-org-2370 52 10 attacks attack NNS blog-dshr-org-2370 52 11 against against IN blog-dshr-org-2370 52 12 US US NNP blog-dshr-org-2370 52 13 companies company NNS blog-dshr-org-2370 52 14 as as RB blog-dshr-org-2370 52 15 fast fast RB blog-dshr-org-2370 52 16 as as IN blog-dshr-org-2370 52 17 they -PRON- PRP blog-dshr-org-2370 52 18 can can MD blog-dshr-org-2370 52 19 . . . blog-dshr-org-2370 53 1 Victims victim NNS blog-dshr-org-2370 53 2 would would MD blog-dshr-org-2370 53 3 see see VB blog-dshr-org-2370 53 4 , , , blog-dshr-org-2370 53 5 instead instead RB blog-dshr-org-2370 53 6 of of IN blog-dshr-org-2370 53 7 a a DT blog-dshr-org-2370 53 8 screen screen NN blog-dshr-org-2370 53 9 demanding demand VBG blog-dshr-org-2370 53 10 a a DT blog-dshr-org-2370 53 11 ransom ransom NN blog-dshr-org-2370 53 12 in in IN blog-dshr-org-2370 53 13 Monero Monero NNP blog-dshr-org-2370 53 14 to to TO blog-dshr-org-2370 53 15 decrypt decrypt VB blog-dshr-org-2370 53 16 their -PRON- PRP$ blog-dshr-org-2370 53 17 data datum NNS blog-dshr-org-2370 53 18 , , , blog-dshr-org-2370 53 19 a a DT blog-dshr-org-2370 53 20 screen screen NN blog-dshr-org-2370 53 21 saying say VBG blog-dshr-org-2370 53 22 : : : blog-dshr-org-2370 53 23 US US NNP blog-dshr-org-2370 53 24 Government Government NNP blog-dshr-org-2370 53 25 CyberSecurity CyberSecurity NNP blog-dshr-org-2370 53 26 Agency Agency NNP blog-dshr-org-2370 53 27 Patch Patch NNP blog-dshr-org-2370 53 28 the the DT blog-dshr-org-2370 53 29 following follow VBG blog-dshr-org-2370 53 30 vulnerabilities vulnerability NNS blog-dshr-org-2370 53 31 immediately immediately RB blog-dshr-org-2370 53 32 ! ! . blog-dshr-org-2370 54 1 The the DT blog-dshr-org-2370 54 2 CyberSecurity CyberSecurity NNP blog-dshr-org-2370 54 3 Agency Agency NNP blog-dshr-org-2370 54 4 ( ( -LRB- blog-dshr-org-2370 54 5 CSA CSA NNP blog-dshr-org-2370 54 6 ) ) -RRB- blog-dshr-org-2370 54 7 used use VBD blog-dshr-org-2370 54 8 some some DT blog-dshr-org-2370 54 9 or or CC blog-dshr-org-2370 54 10 all all DT blog-dshr-org-2370 54 11 of of IN blog-dshr-org-2370 54 12 the the DT blog-dshr-org-2370 54 13 following follow VBG blog-dshr-org-2370 54 14 vulnerabilities vulnerability NNS blog-dshr-org-2370 54 15 to to TO blog-dshr-org-2370 54 16 compromise compromise VB blog-dshr-org-2370 54 17 your -PRON- PRP$ blog-dshr-org-2370 54 18 systems system NNS blog-dshr-org-2370 54 19 and and CC blog-dshr-org-2370 54 20 display display VB blog-dshr-org-2370 54 21 this this DT blog-dshr-org-2370 54 22 notice notice NN blog-dshr-org-2370 54 23 : : : blog-dshr-org-2370 54 24 CVE-2021-XXXXX CVE-2021-XXXXX NNP blog-dshr-org-2370 54 25 CVE-2021-YYYYY CVE-2021-YYYYY NNP blog-dshr-org-2370 54 26 CVE-2021-ZZZZZ CVE-2021-ZZZZZ NNP blog-dshr-org-2370 54 27 Three three CD blog-dshr-org-2370 54 28 days day NNS blog-dshr-org-2370 54 29 from from IN blog-dshr-org-2370 54 30 now now RB blog-dshr-org-2370 54 31 if if IN blog-dshr-org-2370 54 32 these these DT blog-dshr-org-2370 54 33 vulnerabilities vulnerability NNS blog-dshr-org-2370 54 34 are be VBP blog-dshr-org-2370 54 35 still still RB blog-dshr-org-2370 54 36 present present JJ blog-dshr-org-2370 54 37 , , , blog-dshr-org-2370 54 38 the the DT blog-dshr-org-2370 54 39 CSA CSA NNP blog-dshr-org-2370 54 40 will will MD blog-dshr-org-2370 54 41 encrypt encrypt VB blog-dshr-org-2370 54 42 your -PRON- PRP$ blog-dshr-org-2370 54 43 data datum NNS blog-dshr-org-2370 54 44 . . . blog-dshr-org-2370 55 1 You -PRON- PRP blog-dshr-org-2370 55 2 will will MD blog-dshr-org-2370 55 3 be be VB blog-dshr-org-2370 55 4 able able JJ blog-dshr-org-2370 55 5 to to TO blog-dshr-org-2370 55 6 obtain obtain VB blog-dshr-org-2370 55 7 free free JJ blog-dshr-org-2370 55 8 decryption decryption NN blog-dshr-org-2370 55 9 assistance assistance NN blog-dshr-org-2370 55 10 from from IN blog-dshr-org-2370 55 11 the the DT blog-dshr-org-2370 55 12 CSA CSA NNP blog-dshr-org-2370 55 13 once once IN blog-dshr-org-2370 55 14 you -PRON- PRP blog-dshr-org-2370 55 15 can can MD blog-dshr-org-2370 55 16 prove prove VB blog-dshr-org-2370 55 17 that that IN blog-dshr-org-2370 55 18 these these DT blog-dshr-org-2370 55 19 vulnerabilities vulnerability NNS blog-dshr-org-2370 55 20 are be VBP blog-dshr-org-2370 55 21 no no RB blog-dshr-org-2370 55 22 longer long RBR blog-dshr-org-2370 55 23 present present JJ blog-dshr-org-2370 55 24 . . . blog-dshr-org-2370 56 1 If if IN blog-dshr-org-2370 56 2 the the DT blog-dshr-org-2370 56 3 victim victim NN blog-dshr-org-2370 56 4 ignored ignore VBD blog-dshr-org-2370 56 5 the the DT blog-dshr-org-2370 56 6 notice notice NN blog-dshr-org-2370 56 7 , , , blog-dshr-org-2370 56 8 three three CD blog-dshr-org-2370 56 9 days day NNS blog-dshr-org-2370 56 10 later later RB blog-dshr-org-2370 56 11 they -PRON- PRP blog-dshr-org-2370 56 12 would would MD blog-dshr-org-2370 56 13 see see VB blog-dshr-org-2370 56 14 : : : blog-dshr-org-2370 56 15 US US NNP blog-dshr-org-2370 56 16 Government Government NNP blog-dshr-org-2370 56 17 CyberSecurity CyberSecurity NNP blog-dshr-org-2370 56 18 Agency Agency NNP blog-dshr-org-2370 56 19 The the DT blog-dshr-org-2370 56 20 CyberSecurity CyberSecurity NNP blog-dshr-org-2370 56 21 Agency Agency NNP blog-dshr-org-2370 56 22 ( ( -LRB- blog-dshr-org-2370 56 23 CSA CSA NNP blog-dshr-org-2370 56 24 ) ) -RRB- blog-dshr-org-2370 56 25 used use VBD blog-dshr-org-2370 56 26 some some DT blog-dshr-org-2370 56 27 or or CC blog-dshr-org-2370 56 28 all all DT blog-dshr-org-2370 56 29 of of IN blog-dshr-org-2370 56 30 the the DT blog-dshr-org-2370 56 31 following follow VBG blog-dshr-org-2370 56 32 vulnerabilities vulnerability NNS blog-dshr-org-2370 56 33 to to TO blog-dshr-org-2370 56 34 compromise compromise VB blog-dshr-org-2370 56 35 your -PRON- PRP$ blog-dshr-org-2370 56 36 systems system NNS blog-dshr-org-2370 56 37 and and CC blog-dshr-org-2370 56 38 encrypt encrypt VB blog-dshr-org-2370 56 39 your -PRON- PRP$ blog-dshr-org-2370 56 40 data datum NNS blog-dshr-org-2370 56 41 : : : blog-dshr-org-2370 56 42 CVE-2021-XXXXX CVE-2021-XXXXX NNP blog-dshr-org-2370 56 43 CVE-2021-YYYYY CVE-2021-YYYYY NNP blog-dshr-org-2370 56 44 CVE-2021-ZZZZZ CVE-2021-ZZZZZ NNP blog-dshr-org-2370 56 45 Once once IN blog-dshr-org-2370 56 46 you -PRON- PRP blog-dshr-org-2370 56 47 have have VBP blog-dshr-org-2370 56 48 patched patch VBN blog-dshr-org-2370 56 49 these these DT blog-dshr-org-2370 56 50 vulnerabilities vulnerability NNS blog-dshr-org-2370 56 51 , , , blog-dshr-org-2370 56 52 click click VB blog-dshr-org-2370 56 53 here here RB blog-dshr-org-2370 56 54 to to TO blog-dshr-org-2370 56 55 decrypt decrypt VB blog-dshr-org-2370 56 56 your -PRON- PRP$ blog-dshr-org-2370 56 57 data datum NNS blog-dshr-org-2370 56 58 Three three CD blog-dshr-org-2370 56 59 days day NNS blog-dshr-org-2370 56 60 from from IN blog-dshr-org-2370 56 61 now now RB blog-dshr-org-2370 56 62 if if IN blog-dshr-org-2370 56 63 these these DT blog-dshr-org-2370 56 64 vulnerabilities vulnerability NNS blog-dshr-org-2370 56 65 are be VBP blog-dshr-org-2370 56 66 still still RB blog-dshr-org-2370 56 67 present present JJ blog-dshr-org-2370 56 68 , , , blog-dshr-org-2370 56 69 the the DT blog-dshr-org-2370 56 70 CSA CSA NNP blog-dshr-org-2370 56 71 will will MD blog-dshr-org-2370 56 72 re re VB blog-dshr-org-2370 56 73 - - VB blog-dshr-org-2370 56 74 encrypt encrypt VB blog-dshr-org-2370 56 75 your -PRON- PRP$ blog-dshr-org-2370 56 76 data datum NNS blog-dshr-org-2370 56 77 . . . blog-dshr-org-2370 57 1 For for IN blog-dshr-org-2370 57 2 a a DT blog-dshr-org-2370 57 3 fee fee NN blog-dshr-org-2370 57 4 you -PRON- PRP blog-dshr-org-2370 57 5 will will MD blog-dshr-org-2370 57 6 be be VB blog-dshr-org-2370 57 7 able able JJ blog-dshr-org-2370 57 8 to to TO blog-dshr-org-2370 57 9 obtain obtain VB blog-dshr-org-2370 57 10 decryption decryption NN blog-dshr-org-2370 57 11 assistance assistance NN blog-dshr-org-2370 57 12 from from IN blog-dshr-org-2370 57 13 the the DT blog-dshr-org-2370 57 14 CSA CSA NNP blog-dshr-org-2370 57 15 once once IN blog-dshr-org-2370 57 16 you -PRON- PRP blog-dshr-org-2370 57 17 can can MD blog-dshr-org-2370 57 18 prove prove VB blog-dshr-org-2370 57 19 that that IN blog-dshr-org-2370 57 20 these these DT blog-dshr-org-2370 57 21 vulnerabilities vulnerability NNS blog-dshr-org-2370 57 22 are be VBP blog-dshr-org-2370 57 23 no no RB blog-dshr-org-2370 57 24 longer long RBR blog-dshr-org-2370 57 25 present present JJ blog-dshr-org-2370 57 26 . . . blog-dshr-org-2370 58 1 The the DT blog-dshr-org-2370 58 2 program program NN blog-dshr-org-2370 58 3 would would MD blog-dshr-org-2370 58 4 start start VB blog-dshr-org-2370 58 5 out out RP blog-dshr-org-2370 58 6 fairly fairly RB blog-dshr-org-2370 58 7 gentle gentle JJ blog-dshr-org-2370 58 8 and and CC blog-dshr-org-2370 58 9 ramp ramp VB blog-dshr-org-2370 58 10 up up RP blog-dshr-org-2370 58 11 , , , blog-dshr-org-2370 58 12 shortening shorten VBG blog-dshr-org-2370 58 13 the the DT blog-dshr-org-2370 58 14 grace grace NN blog-dshr-org-2370 58 15 period period NN blog-dshr-org-2370 58 16 to to TO blog-dshr-org-2370 58 17 increase increase VB blog-dshr-org-2370 58 18 the the DT blog-dshr-org-2370 58 19 impact impact NN blog-dshr-org-2370 58 20 . . . blog-dshr-org-2370 59 1 The the DT blog-dshr-org-2370 59 2 program program NN blog-dshr-org-2370 59 3 would would MD blog-dshr-org-2370 59 4 motivate motivate VB blog-dshr-org-2370 59 5 users user NNS blog-dshr-org-2370 59 6 to to TO blog-dshr-org-2370 59 7 keep keep VB blog-dshr-org-2370 59 8 their -PRON- PRP$ blog-dshr-org-2370 59 9 systems system NNS blog-dshr-org-2370 59 10 up up RB blog-dshr-org-2370 59 11 - - HYPH blog-dshr-org-2370 59 12 to to IN blog-dshr-org-2370 59 13 - - HYPH blog-dshr-org-2370 59 14 date date NN blog-dshr-org-2370 59 15 with with IN blog-dshr-org-2370 59 16 patches patch NNS blog-dshr-org-2370 59 17 for for IN blog-dshr-org-2370 59 18 disclosed disclosed JJ blog-dshr-org-2370 59 19 vulnerabilities vulnerability NNS blog-dshr-org-2370 59 20 , , , blog-dshr-org-2370 59 21 which which WDT blog-dshr-org-2370 59 22 would would MD blog-dshr-org-2370 59 23 not not RB blog-dshr-org-2370 59 24 merely merely RB blog-dshr-org-2370 59 25 help help VB blog-dshr-org-2370 59 26 with with IN blog-dshr-org-2370 59 27 ransomware ransomware NN blog-dshr-org-2370 59 28 , , , blog-dshr-org-2370 59 29 but but CC blog-dshr-org-2370 59 30 also also RB blog-dshr-org-2370 59 31 with with IN blog-dshr-org-2370 59 32 botnets botnet NNS blog-dshr-org-2370 59 33 , , , blog-dshr-org-2370 59 34 data data NN blog-dshr-org-2370 59 35 breaches breach NNS blog-dshr-org-2370 59 36 and and CC blog-dshr-org-2370 59 37 other other JJ blog-dshr-org-2370 59 38 forms form NNS blog-dshr-org-2370 59 39 of of IN blog-dshr-org-2370 59 40 malware malware NNP blog-dshr-org-2370 59 41 . . . blog-dshr-org-2370 60 1 It -PRON- PRP blog-dshr-org-2370 60 2 would would MD blog-dshr-org-2370 60 3 also also RB blog-dshr-org-2370 60 4 raise raise VB blog-dshr-org-2370 60 5 the the DT blog-dshr-org-2370 60 6 annoyance annoyance NN blog-dshr-org-2370 60 7 factor factor NN blog-dshr-org-2370 60 8 customers customer NNS blog-dshr-org-2370 60 9 face face VBP blog-dshr-org-2370 60 10 when when WRB blog-dshr-org-2370 60 11 their -PRON- PRP$ blog-dshr-org-2370 60 12 supplier supplier NN blog-dshr-org-2370 60 13 fails fail VBZ blog-dshr-org-2370 60 14 to to TO blog-dshr-org-2370 60 15 provide provide VB blog-dshr-org-2370 60 16 adequate adequate JJ blog-dshr-org-2370 60 17 security security NN blog-dshr-org-2370 60 18 in in IN blog-dshr-org-2370 60 19 their -PRON- PRP$ blog-dshr-org-2370 60 20 products product NNS blog-dshr-org-2370 60 21 . . . blog-dshr-org-2370 61 1 This this DT blog-dshr-org-2370 61 2 in in IN blog-dshr-org-2370 61 3 turn turn NN blog-dshr-org-2370 61 4 would would MD blog-dshr-org-2370 61 5 provide provide VB blog-dshr-org-2370 61 6 reputational reputational JJ blog-dshr-org-2370 61 7 and and CC blog-dshr-org-2370 61 8 sales sale NNS blog-dshr-org-2370 61 9 pressure pressure NN blog-dshr-org-2370 61 10 on on IN blog-dshr-org-2370 61 11 suppliers supplier NNS blog-dshr-org-2370 61 12 to to TO blog-dshr-org-2370 61 13 both both DT blog-dshr-org-2370 61 14 secure secure VB blog-dshr-org-2370 61 15 their -PRON- PRP$ blog-dshr-org-2370 61 16 supply supply NN blog-dshr-org-2370 61 17 chain chain NN blog-dshr-org-2370 61 18 and and CC blog-dshr-org-2370 61 19 , , , blog-dshr-org-2370 61 20 unlike unlike IN blog-dshr-org-2370 61 21 Kaseya Kaseya NNP blog-dshr-org-2370 61 22 , , , blog-dshr-org-2370 61 23 prioritize prioritize VB blog-dshr-org-2370 61 24 security security NN blog-dshr-org-2370 61 25 in in IN blog-dshr-org-2370 61 26 their -PRON- PRP$ blog-dshr-org-2370 61 27 product product NN blog-dshr-org-2370 61 28 development development NN blog-dshr-org-2370 61 29 . . . blog-dshr-org-2370 62 1 Of of RB blog-dshr-org-2370 62 2 course course RB blog-dshr-org-2370 62 3 , , , blog-dshr-org-2370 62 4 the the DT blog-dshr-org-2370 62 5 program program NN blog-dshr-org-2370 62 6 above above IN blog-dshr-org-2370 62 7 only only RB blog-dshr-org-2370 62 8 handles handle NNS blog-dshr-org-2370 62 9 disclosed disclose VBN blog-dshr-org-2370 62 10 vulnerabilities vulnerability NNS blog-dshr-org-2370 62 11 , , , blog-dshr-org-2370 62 12 not not RB blog-dshr-org-2370 62 13 the the DT blog-dshr-org-2370 62 14 0-days 0-days CD blog-dshr-org-2370 62 15 REvil REvil NNP blog-dshr-org-2370 62 16 used use VBN blog-dshr-org-2370 62 17 . . . blog-dshr-org-2370 63 1 There there EX blog-dshr-org-2370 63 2 is be VBZ blog-dshr-org-2370 63 3 an an DT blog-dshr-org-2370 63 4 flourishing flourishing JJ blog-dshr-org-2370 63 5 trade trade NN blog-dshr-org-2370 63 6 in in IN blog-dshr-org-2370 63 7 0-days 0-days CD blog-dshr-org-2370 63 8 , , , blog-dshr-org-2370 63 9 of of IN blog-dshr-org-2370 63 10 which which WDT blog-dshr-org-2370 63 11 the the DT blog-dshr-org-2370 63 12 NSA NSA NNP blog-dshr-org-2370 63 13 is be VBZ blog-dshr-org-2370 63 14 believed believe VBN blog-dshr-org-2370 63 15 to to TO blog-dshr-org-2370 63 16 be be VB blog-dshr-org-2370 63 17 a a DT blog-dshr-org-2370 63 18 major major JJ blog-dshr-org-2370 63 19 buyer buyer NN blog-dshr-org-2370 63 20 . . . blog-dshr-org-2370 64 1 The the DT blog-dshr-org-2370 64 2 supply supply NN blog-dshr-org-2370 64 3 in in IN blog-dshr-org-2370 64 4 these these DT blog-dshr-org-2370 64 5 markets market NNS blog-dshr-org-2370 64 6 is be VBZ blog-dshr-org-2370 64 7 increasing increase VBG blog-dshr-org-2370 64 8 , , , blog-dshr-org-2370 64 9 as as IN blog-dshr-org-2370 64 10 Dan Dan NNP blog-dshr-org-2370 64 11 Goodin Goodin NNP blog-dshr-org-2370 64 12 reports report VBZ blog-dshr-org-2370 64 13 in in IN blog-dshr-org-2370 64 14 iOS ios JJ blog-dshr-org-2370 64 15 zero zero CD blog-dshr-org-2370 64 16 - - HYPH blog-dshr-org-2370 64 17 day day NN blog-dshr-org-2370 64 18 let let VBD blog-dshr-org-2370 64 19 SolarWinds SolarWinds NNP blog-dshr-org-2370 64 20 hackers hacker NNS blog-dshr-org-2370 64 21 compromise compromise NN blog-dshr-org-2370 64 22 fully fully RB blog-dshr-org-2370 64 23 updated update VBN blog-dshr-org-2370 64 24 iPhones iPhones NNPS blog-dshr-org-2370 64 25 : : : blog-dshr-org-2370 64 26 In in IN blog-dshr-org-2370 64 27 the the DT blog-dshr-org-2370 64 28 first first JJ blog-dshr-org-2370 64 29 half half NN blog-dshr-org-2370 64 30 of of IN blog-dshr-org-2370 64 31 this this DT blog-dshr-org-2370 64 32 year year NN blog-dshr-org-2370 64 33 , , , blog-dshr-org-2370 64 34 Google Google NNP blog-dshr-org-2370 64 35 ’s ’s POS blog-dshr-org-2370 64 36 Project Project NNP blog-dshr-org-2370 64 37 Zero Zero NNP blog-dshr-org-2370 64 38 vulnerability vulnerability NN blog-dshr-org-2370 64 39 research research NN blog-dshr-org-2370 64 40 group group NN blog-dshr-org-2370 64 41 has have VBZ blog-dshr-org-2370 64 42 recorded record VBN blog-dshr-org-2370 64 43 33 33 CD blog-dshr-org-2370 64 44 zero zero CD blog-dshr-org-2370 64 45 - - HYPH blog-dshr-org-2370 64 46 day day NN blog-dshr-org-2370 64 47 exploits exploit NNS blog-dshr-org-2370 64 48 used use VBN blog-dshr-org-2370 64 49 in in IN blog-dshr-org-2370 64 50 attacks—11 attacks—11 NN blog-dshr-org-2370 64 51 more more JJR blog-dshr-org-2370 64 52 than than IN blog-dshr-org-2370 64 53 the the DT blog-dshr-org-2370 64 54 total total JJ blog-dshr-org-2370 64 55 number number NN blog-dshr-org-2370 64 56 from from IN blog-dshr-org-2370 64 57 2020 2020 CD blog-dshr-org-2370 64 58 . . . blog-dshr-org-2370 65 1 The the DT blog-dshr-org-2370 65 2 growth growth NN blog-dshr-org-2370 65 3 has have VBZ blog-dshr-org-2370 65 4 several several JJ blog-dshr-org-2370 65 5 causes cause NNS blog-dshr-org-2370 65 6 , , , blog-dshr-org-2370 65 7 including include VBG blog-dshr-org-2370 65 8 better well JJR blog-dshr-org-2370 65 9 detection detection NN blog-dshr-org-2370 65 10 by by IN blog-dshr-org-2370 65 11 defenders defender NNS blog-dshr-org-2370 65 12 and and CC blog-dshr-org-2370 65 13 better well JJR blog-dshr-org-2370 65 14 software software NN blog-dshr-org-2370 65 15 defenses defense NNS blog-dshr-org-2370 65 16 that that WDT blog-dshr-org-2370 65 17 require require VBP blog-dshr-org-2370 65 18 multiple multiple JJ blog-dshr-org-2370 65 19 exploits exploit NNS blog-dshr-org-2370 65 20 to to TO blog-dshr-org-2370 65 21 break break VB blog-dshr-org-2370 65 22 through through RP blog-dshr-org-2370 65 23 . . . blog-dshr-org-2370 66 1 The the DT blog-dshr-org-2370 66 2 other other JJ blog-dshr-org-2370 66 3 big big JJ blog-dshr-org-2370 66 4 driver driver NN blog-dshr-org-2370 66 5 is be VBZ blog-dshr-org-2370 66 6 the the DT blog-dshr-org-2370 66 7 increased increased JJ blog-dshr-org-2370 66 8 supply supply NN blog-dshr-org-2370 66 9 of of IN blog-dshr-org-2370 66 10 zero zero CD blog-dshr-org-2370 66 11 - - HYPH blog-dshr-org-2370 66 12 days day NNS blog-dshr-org-2370 66 13 from from IN blog-dshr-org-2370 66 14 private private JJ blog-dshr-org-2370 66 15 companies company NNS blog-dshr-org-2370 66 16 selling sell VBG blog-dshr-org-2370 66 17 exploits exploit NNS blog-dshr-org-2370 66 18 . . . blog-dshr-org-2370 67 1 “ " `` blog-dshr-org-2370 67 2 0-day 0-day NN blog-dshr-org-2370 67 3 capabilities capability NNS blog-dshr-org-2370 67 4 used use VBN blog-dshr-org-2370 67 5 to to TO blog-dshr-org-2370 67 6 be be VB blog-dshr-org-2370 67 7 only only RB blog-dshr-org-2370 67 8 the the DT blog-dshr-org-2370 67 9 tools tool NNS blog-dshr-org-2370 67 10 of of IN blog-dshr-org-2370 67 11 select select JJ blog-dshr-org-2370 67 12 nation nation NN blog-dshr-org-2370 67 13 - - HYPH blog-dshr-org-2370 67 14 states state NNS blog-dshr-org-2370 67 15 who who WP blog-dshr-org-2370 67 16 had have VBD blog-dshr-org-2370 67 17 the the DT blog-dshr-org-2370 67 18 technical technical JJ blog-dshr-org-2370 67 19 expertise expertise NN blog-dshr-org-2370 67 20 to to TO blog-dshr-org-2370 67 21 find find VB blog-dshr-org-2370 67 22 0-day 0-day NN blog-dshr-org-2370 67 23 vulnerabilities vulnerability NNS blog-dshr-org-2370 67 24 , , , blog-dshr-org-2370 67 25 develop develop VB blog-dshr-org-2370 67 26 them -PRON- PRP blog-dshr-org-2370 67 27 into into IN blog-dshr-org-2370 67 28 exploits exploit NNS blog-dshr-org-2370 67 29 , , , blog-dshr-org-2370 67 30 and and CC blog-dshr-org-2370 67 31 then then RB blog-dshr-org-2370 67 32 strategically strategically RB blog-dshr-org-2370 67 33 operationalize operationalize VBP blog-dshr-org-2370 67 34 their -PRON- PRP$ blog-dshr-org-2370 67 35 use use NN blog-dshr-org-2370 67 36 , , , blog-dshr-org-2370 67 37 ” " '' blog-dshr-org-2370 67 38 the the DT blog-dshr-org-2370 67 39 Google Google NNP blog-dshr-org-2370 67 40 researchers researcher NNS blog-dshr-org-2370 67 41 wrote write VBD blog-dshr-org-2370 67 42 . . . blog-dshr-org-2370 68 1 “ " `` blog-dshr-org-2370 68 2 In in IN blog-dshr-org-2370 68 3 the the DT blog-dshr-org-2370 68 4 mid mid NN blog-dshr-org-2370 68 5 - - HYPH blog-dshr-org-2370 68 6 to to IN blog-dshr-org-2370 68 7 - - HYPH blog-dshr-org-2370 68 8 late late JJ blog-dshr-org-2370 68 9 2010s 2010 NNS blog-dshr-org-2370 68 10 , , , blog-dshr-org-2370 68 11 more more RBR blog-dshr-org-2370 68 12 private private JJ blog-dshr-org-2370 68 13 companies company NNS blog-dshr-org-2370 68 14 have have VBP blog-dshr-org-2370 68 15 joined join VBN blog-dshr-org-2370 68 16 the the DT blog-dshr-org-2370 68 17 marketplace marketplace NN blog-dshr-org-2370 68 18 selling sell VBG blog-dshr-org-2370 68 19 these these DT blog-dshr-org-2370 68 20 0-day 0-day NNP blog-dshr-org-2370 68 21 capabilities capability NNS blog-dshr-org-2370 68 22 . . . blog-dshr-org-2370 69 1 No no RB blog-dshr-org-2370 69 2 longer long RBR blog-dshr-org-2370 69 3 do do VBP blog-dshr-org-2370 69 4 groups group NNS blog-dshr-org-2370 69 5 need need VB blog-dshr-org-2370 69 6 to to TO blog-dshr-org-2370 69 7 have have VB blog-dshr-org-2370 69 8 the the DT blog-dshr-org-2370 69 9 technical technical JJ blog-dshr-org-2370 69 10 expertise expertise NN blog-dshr-org-2370 69 11 ; ; : blog-dshr-org-2370 69 12 now now RB blog-dshr-org-2370 69 13 they -PRON- PRP blog-dshr-org-2370 69 14 just just RB blog-dshr-org-2370 69 15 need need VBP blog-dshr-org-2370 69 16 resources resource NNS blog-dshr-org-2370 69 17 . . . blog-dshr-org-2370 69 18 ” " '' blog-dshr-org-2370 69 19 The the DT blog-dshr-org-2370 69 20 iOS ios JJ blog-dshr-org-2370 69 21 vulnerability vulnerability NN blog-dshr-org-2370 69 22 was be VBD blog-dshr-org-2370 69 23 one one CD blog-dshr-org-2370 69 24 of of IN blog-dshr-org-2370 69 25 four four CD blog-dshr-org-2370 69 26 in in IN blog-dshr-org-2370 69 27 - - HYPH blog-dshr-org-2370 69 28 the the DT blog-dshr-org-2370 69 29 - - HYPH blog-dshr-org-2370 69 30 wild wild JJ blog-dshr-org-2370 69 31 zero zero CD blog-dshr-org-2370 69 32 - - HYPH blog-dshr-org-2370 69 33 days day NNS blog-dshr-org-2370 69 34 Google Google NNP blog-dshr-org-2370 69 35 detailed detail VBN blog-dshr-org-2370 69 36 on on IN blog-dshr-org-2370 69 37 Wednesday Wednesday NNP blog-dshr-org-2370 69 38 . . . blog-dshr-org-2370 70 1 ... ... : blog-dshr-org-2370 70 2 Based base VBN blog-dshr-org-2370 70 3 on on IN blog-dshr-org-2370 70 4 their -PRON- PRP$ blog-dshr-org-2370 70 5 analysis analysis NN blog-dshr-org-2370 70 6 , , , blog-dshr-org-2370 70 7 the the DT blog-dshr-org-2370 70 8 researchers researcher NNS blog-dshr-org-2370 70 9 assess assess VBP blog-dshr-org-2370 70 10 that that IN blog-dshr-org-2370 70 11 three three CD blog-dshr-org-2370 70 12 of of IN blog-dshr-org-2370 70 13 the the DT blog-dshr-org-2370 70 14 exploits exploit NNS blog-dshr-org-2370 70 15 were be VBD blog-dshr-org-2370 70 16 developed develop VBN blog-dshr-org-2370 70 17 by by IN blog-dshr-org-2370 70 18 the the DT blog-dshr-org-2370 70 19 same same JJ blog-dshr-org-2370 70 20 commercial commercial JJ blog-dshr-org-2370 70 21 surveillance surveillance NN blog-dshr-org-2370 70 22 company company NN blog-dshr-org-2370 70 23 , , , blog-dshr-org-2370 70 24 which which WDT blog-dshr-org-2370 70 25 sold sell VBD blog-dshr-org-2370 70 26 them -PRON- PRP blog-dshr-org-2370 70 27 to to IN blog-dshr-org-2370 70 28 two two CD blog-dshr-org-2370 70 29 different different JJ blog-dshr-org-2370 70 30 government government NN blog-dshr-org-2370 70 31 - - HYPH blog-dshr-org-2370 70 32 backed back VBN blog-dshr-org-2370 70 33 actors actor NNS blog-dshr-org-2370 70 34 . . . blog-dshr-org-2370 71 1 As as IN blog-dshr-org-2370 71 2 has have VBZ blog-dshr-org-2370 71 3 been be VBN blog-dshr-org-2370 71 4 true true JJ blog-dshr-org-2370 71 5 since since IN blog-dshr-org-2370 71 6 the the DT blog-dshr-org-2370 71 7 Cold Cold NNP blog-dshr-org-2370 71 8 - - HYPH blog-dshr-org-2370 71 9 War War NNP blog-dshr-org-2370 71 10 era era NN blog-dshr-org-2370 71 11 and and CC blog-dshr-org-2370 71 12 the the DT blog-dshr-org-2370 71 13 " " `` blog-dshr-org-2370 71 14 Crypto Crypto NNP blog-dshr-org-2370 71 15 Wars Wars NNPS blog-dshr-org-2370 71 16 " " '' blog-dshr-org-2370 71 17 of of IN blog-dshr-org-2370 71 18 the the DT blog-dshr-org-2370 71 19 1980s 1980 NNS blog-dshr-org-2370 71 20 when when WRB blog-dshr-org-2370 71 21 cryptography cryptography NN blog-dshr-org-2370 71 22 was be VBD blog-dshr-org-2370 71 23 considered consider VBN blog-dshr-org-2370 71 24 a a DT blog-dshr-org-2370 71 25 munition munition NN blog-dshr-org-2370 71 26 , , , blog-dshr-org-2370 71 27 the the DT blog-dshr-org-2370 71 28 US US NNP blog-dshr-org-2370 71 29 has have VBZ blog-dshr-org-2370 71 30 prioritized prioritize VBN blog-dshr-org-2370 71 31 attack attack NN blog-dshr-org-2370 71 32 over over IN blog-dshr-org-2370 71 33 defense defense NN blog-dshr-org-2370 71 34 . . . blog-dshr-org-2370 72 1 The the DT blog-dshr-org-2370 72 2 NSA NSA NNP blog-dshr-org-2370 72 3 routinely routinely RB blog-dshr-org-2370 72 4 hoards hoard VBZ blog-dshr-org-2370 72 5 0-days 0-days NFP blog-dshr-org-2370 72 6 , , , blog-dshr-org-2370 72 7 preferring prefer VBG blog-dshr-org-2370 72 8 to to TO blog-dshr-org-2370 72 9 use use VB blog-dshr-org-2370 72 10 them -PRON- PRP blog-dshr-org-2370 72 11 to to TO blog-dshr-org-2370 72 12 attack attack VB blog-dshr-org-2370 72 13 foreigners foreigner NNS blog-dshr-org-2370 72 14 rather rather RB blog-dshr-org-2370 72 15 than than IN blog-dshr-org-2370 72 16 disclose disclose VB blog-dshr-org-2370 72 17 them -PRON- PRP blog-dshr-org-2370 72 18 to to TO blog-dshr-org-2370 72 19 protect protect VB blog-dshr-org-2370 72 20 US US NNP blog-dshr-org-2370 72 21 citizens citizen NNS blog-dshr-org-2370 72 22 ( ( -LRB- blog-dshr-org-2370 72 23 and and CC blog-dshr-org-2370 72 24 others other NNS blog-dshr-org-2370 72 25 ) ) -RRB- blog-dshr-org-2370 72 26 . . . blog-dshr-org-2370 73 1 This this DT blog-dshr-org-2370 73 2 short short JJ blog-dshr-org-2370 73 3 - - HYPH blog-dshr-org-2370 73 4 sighted sighted JJ blog-dshr-org-2370 73 5 policy policy NN blog-dshr-org-2370 73 6 has have VBZ blog-dshr-org-2370 73 7 led lead VBN blog-dshr-org-2370 73 8 to to IN blog-dshr-org-2370 73 9 several several JJ blog-dshr-org-2370 73 10 disasters disaster NNS blog-dshr-org-2370 73 11 , , , blog-dshr-org-2370 73 12 including include VBG blog-dshr-org-2370 73 13 the the DT blog-dshr-org-2370 73 14 Juniper Juniper NNP blog-dshr-org-2370 73 15 supply supply NN blog-dshr-org-2370 73 16 - - HYPH blog-dshr-org-2370 73 17 chain chain NN blog-dshr-org-2370 73 18 compromise compromise NN blog-dshr-org-2370 73 19 and and CC blog-dshr-org-2370 73 20 NotPetya NotPetya NNP blog-dshr-org-2370 73 21 . . . blog-dshr-org-2370 74 1 Senators senator NNS blog-dshr-org-2370 74 2 wrote write VBD blog-dshr-org-2370 74 3 to to IN blog-dshr-org-2370 74 4 the the DT blog-dshr-org-2370 74 5 head head NN blog-dshr-org-2370 74 6 of of IN blog-dshr-org-2370 74 7 the the DT blog-dshr-org-2370 74 8 NSA NSA NNP blog-dshr-org-2370 74 9 , , , blog-dshr-org-2370 74 10 and and CC blog-dshr-org-2370 74 11 the the DT blog-dshr-org-2370 74 12 EFF EFF NNP blog-dshr-org-2370 74 13 sued sue VBD blog-dshr-org-2370 74 14 the the DT blog-dshr-org-2370 74 15 Director Director NNP blog-dshr-org-2370 74 16 of of IN blog-dshr-org-2370 74 17 National National NNP blog-dshr-org-2370 74 18 Intelligence Intelligence NNP blog-dshr-org-2370 74 19 , , , blog-dshr-org-2370 74 20 to to TO blog-dshr-org-2370 74 21 obtain obtain VB blog-dshr-org-2370 74 22 the the DT blog-dshr-org-2370 74 23 NSA NSA NNP blog-dshr-org-2370 74 24 's 's POS blog-dshr-org-2370 74 25 policy policy NN blog-dshr-org-2370 74 26 around around RB blog-dshr-org-2370 74 27 0-days 0-days CD blog-dshr-org-2370 74 28 : : : blog-dshr-org-2370 74 29 Since since IN blog-dshr-org-2370 74 30 these these DT blog-dshr-org-2370 74 31 vulnerabilities vulnerability NNS blog-dshr-org-2370 74 32 potentially potentially RB blog-dshr-org-2370 74 33 affect affect VBP blog-dshr-org-2370 74 34 the the DT blog-dshr-org-2370 74 35 security security NN blog-dshr-org-2370 74 36 of of IN blog-dshr-org-2370 74 37 users user NNS blog-dshr-org-2370 74 38 all all RB blog-dshr-org-2370 74 39 over over IN blog-dshr-org-2370 74 40 the the DT blog-dshr-org-2370 74 41 world world NN blog-dshr-org-2370 74 42 , , , blog-dshr-org-2370 74 43 the the DT blog-dshr-org-2370 74 44 public public NN blog-dshr-org-2370 74 45 has have VBZ blog-dshr-org-2370 74 46 a a DT blog-dshr-org-2370 74 47 strong strong JJ blog-dshr-org-2370 74 48 interest interest NN blog-dshr-org-2370 74 49 in in IN blog-dshr-org-2370 74 50 knowing know VBG blog-dshr-org-2370 74 51 how how WRB blog-dshr-org-2370 74 52 these these DT blog-dshr-org-2370 74 53 agencies agency NNS blog-dshr-org-2370 74 54 are be VBP blog-dshr-org-2370 74 55 weighing weigh VBG blog-dshr-org-2370 74 56 the the DT blog-dshr-org-2370 74 57 risks risk NNS blog-dshr-org-2370 74 58 and and CC blog-dshr-org-2370 74 59 benefits benefit NNS blog-dshr-org-2370 74 60 of of IN blog-dshr-org-2370 74 61 using use VBG blog-dshr-org-2370 74 62 zero zero CD blog-dshr-org-2370 74 63 days day NNS blog-dshr-org-2370 74 64 instead instead RB blog-dshr-org-2370 74 65 of of IN blog-dshr-org-2370 74 66 disclosing disclose VBG blog-dshr-org-2370 74 67 them -PRON- PRP blog-dshr-org-2370 74 68 to to IN blog-dshr-org-2370 74 69 vendors vendor NNS blog-dshr-org-2370 74 70 , , , blog-dshr-org-2370 74 71 It -PRON- PRP blog-dshr-org-2370 74 72 would would MD blog-dshr-org-2370 74 73 be be VB blog-dshr-org-2370 74 74 bad bad JJ blog-dshr-org-2370 74 75 enough enough RB blog-dshr-org-2370 74 76 if if IN blog-dshr-org-2370 74 77 the the DT blog-dshr-org-2370 74 78 NSA NSA NNP blog-dshr-org-2370 74 79 and and CC blog-dshr-org-2370 74 80 other other JJ blog-dshr-org-2370 74 81 nations nation NNS blog-dshr-org-2370 74 82 ' ' POS blog-dshr-org-2370 74 83 security security NN blog-dshr-org-2370 74 84 services service NNS blog-dshr-org-2370 74 85 were be VBD blog-dshr-org-2370 74 86 the the DT blog-dshr-org-2370 74 87 only only JJ blog-dshr-org-2370 74 88 buyers buyer NNS blog-dshr-org-2370 74 89 of of IN blog-dshr-org-2370 74 90 0-days 0-days CD blog-dshr-org-2370 74 91 . . . blog-dshr-org-2370 75 1 But but CC blog-dshr-org-2370 75 2 the the DT blog-dshr-org-2370 75 3 $ $ $ blog-dshr-org-2370 75 4 11 11 CD blog-dshr-org-2370 75 5 M m CD blog-dshr-org-2370 75 6 REvil REvil NNP blog-dshr-org-2370 75 7 received receive VBN blog-dshr-org-2370 75 8 from from IN blog-dshr-org-2370 75 9 JBS JBS NNP blog-dshr-org-2370 75 10 buys buy VBZ blog-dshr-org-2370 75 11 a a DT blog-dshr-org-2370 75 12 lot lot NN blog-dshr-org-2370 75 13 of of IN blog-dshr-org-2370 75 14 them -PRON- PRP blog-dshr-org-2370 75 15 , , , blog-dshr-org-2370 75 16 and and CC blog-dshr-org-2370 75 17 if if IN blog-dshr-org-2370 75 18 each each DT blog-dshr-org-2370 75 19 could could MD blog-dshr-org-2370 75 20 net net VB blog-dshr-org-2370 75 21 $ $ $ blog-dshr-org-2370 75 22 70 70 CD blog-dshr-org-2370 75 23 M m NN blog-dshr-org-2370 75 24 they -PRON- PRP blog-dshr-org-2370 75 25 'd 'd MD blog-dshr-org-2370 75 26 be be VB blog-dshr-org-2370 75 27 a a DT blog-dshr-org-2370 75 28 wonderful wonderful JJ blog-dshr-org-2370 75 29 investment investment NN blog-dshr-org-2370 75 30 . . . blog-dshr-org-2370 76 1 Forcing force VBG blog-dshr-org-2370 76 2 ransomware ransomware NN blog-dshr-org-2370 76 3 gangs gang NNS blog-dshr-org-2370 76 4 to to TO blog-dshr-org-2370 76 5 use use VB blog-dshr-org-2370 76 6 0-days 0-days CD blog-dshr-org-2370 76 7 by by IN blog-dshr-org-2370 76 8 getting get VBG blog-dshr-org-2370 76 9 systems system NNS blog-dshr-org-2370 76 10 up up RB blog-dshr-org-2370 76 11 - - HYPH blog-dshr-org-2370 76 12 to to IN blog-dshr-org-2370 76 13 - - HYPH blog-dshr-org-2370 76 14 date date NN blog-dshr-org-2370 76 15 with with IN blog-dshr-org-2370 76 16 patches patch NNS blog-dshr-org-2370 76 17 is be VBZ blog-dshr-org-2370 76 18 good good JJ blog-dshr-org-2370 76 19 , , , blog-dshr-org-2370 76 20 but but CC blog-dshr-org-2370 76 21 the the DT blog-dshr-org-2370 76 22 gangs gang NNS blog-dshr-org-2370 76 23 will will MD blog-dshr-org-2370 76 24 have have VB blog-dshr-org-2370 76 25 0-days 0-days CD blog-dshr-org-2370 76 26 to to TO blog-dshr-org-2370 76 27 use use VB blog-dshr-org-2370 76 28 . . . blog-dshr-org-2370 77 1 So so CC blog-dshr-org-2370 77 2 although although IN blog-dshr-org-2370 77 3 the the DT blog-dshr-org-2370 77 4 program program NN blog-dshr-org-2370 77 5 above above RB blog-dshr-org-2370 77 6 should should MD blog-dshr-org-2370 77 7 indirectly indirectly RB blog-dshr-org-2370 77 8 reduce reduce VB blog-dshr-org-2370 77 9 the the DT blog-dshr-org-2370 77 10 supply supply NN blog-dshr-org-2370 77 11 ( ( -LRB- blog-dshr-org-2370 77 12 and and CC blog-dshr-org-2370 77 13 thus thus RB blog-dshr-org-2370 77 14 increase increase VB blog-dshr-org-2370 77 15 the the DT blog-dshr-org-2370 77 16 price price NN blog-dshr-org-2370 77 17 ) ) -RRB- blog-dshr-org-2370 77 18 of of IN blog-dshr-org-2370 77 19 0-days 0-days CD blog-dshr-org-2370 77 20 by by IN blog-dshr-org-2370 77 21 motivating motivate VBG blog-dshr-org-2370 77 22 vendors vendor NNS blog-dshr-org-2370 77 23 to to TO blog-dshr-org-2370 77 24 improve improve VB blog-dshr-org-2370 77 25 their -PRON- PRP$ blog-dshr-org-2370 77 26 development development NN blog-dshr-org-2370 77 27 and and CC blog-dshr-org-2370 77 28 supply supply NN blog-dshr-org-2370 77 29 chain chain NN blog-dshr-org-2370 77 30 practices practice NNS blog-dshr-org-2370 77 31 , , , blog-dshr-org-2370 77 32 something something NN blog-dshr-org-2370 77 33 needs need VBZ blog-dshr-org-2370 77 34 to to TO blog-dshr-org-2370 77 35 be be VB blog-dshr-org-2370 77 36 done do VBN blog-dshr-org-2370 77 37 to to TO blog-dshr-org-2370 77 38 reduce reduce VB blog-dshr-org-2370 77 39 the the DT blog-dshr-org-2370 77 40 impact impact NN blog-dshr-org-2370 77 41 of of IN blog-dshr-org-2370 77 42 0-days 0-days CD blog-dshr-org-2370 77 43 on on IN blog-dshr-org-2370 77 44 ransomware ransomware NN blog-dshr-org-2370 77 45 . . . blog-dshr-org-2370 78 1 The the DT blog-dshr-org-2370 78 2 Colonial Colonial NNP blog-dshr-org-2370 78 3 Pipeline Pipeline NNP blog-dshr-org-2370 78 4 and and CC blog-dshr-org-2370 78 5 JBS JBS NNP blog-dshr-org-2370 78 6 attacks attack NNS blog-dshr-org-2370 78 7 , , , blog-dshr-org-2370 78 8 not not RB blog-dshr-org-2370 78 9 to to TO blog-dshr-org-2370 78 10 mention mention VB blog-dshr-org-2370 78 11 the the DT blog-dshr-org-2370 78 12 multiple multiple JJ blog-dshr-org-2370 78 13 hospital hospital NN blog-dshr-org-2370 78 14 chains chain NNS blog-dshr-org-2370 78 15 that that WDT blog-dshr-org-2370 78 16 have have VBP blog-dshr-org-2370 78 17 been be VBN blog-dshr-org-2370 78 18 disrupted disrupt VBN blog-dshr-org-2370 78 19 , , , blog-dshr-org-2370 78 20 show show VBP blog-dshr-org-2370 78 21 that that IN blog-dshr-org-2370 78 22 it -PRON- PRP blog-dshr-org-2370 78 23 is be VBZ blog-dshr-org-2370 78 24 just just RB blog-dshr-org-2370 78 25 a a DT blog-dshr-org-2370 78 26 matter matter NN blog-dshr-org-2370 78 27 of of IN blog-dshr-org-2370 78 28 time time NN blog-dshr-org-2370 78 29 before before IN blog-dshr-org-2370 78 30 a a DT blog-dshr-org-2370 78 31 ransomware ransomware NN blog-dshr-org-2370 78 32 attack attack NN blog-dshr-org-2370 78 33 has have VBZ blog-dshr-org-2370 78 34 a a DT blog-dshr-org-2370 78 35 major major JJ blog-dshr-org-2370 78 36 impact impact NN blog-dshr-org-2370 78 37 on on IN blog-dshr-org-2370 78 38 US US NNP blog-dshr-org-2370 78 39 GDP GDP NNP blog-dshr-org-2370 78 40 ( ( -LRB- blog-dshr-org-2370 78 41 and and CC blog-dshr-org-2370 78 42 incidentally incidentally RB blog-dshr-org-2370 78 43 on on IN blog-dshr-org-2370 78 44 US US NNP blog-dshr-org-2370 78 45 citizens citizen NNS blog-dshr-org-2370 78 46 ) ) -RRB- blog-dshr-org-2370 78 47 . . . blog-dshr-org-2370 79 1 In in IN blog-dshr-org-2370 79 2 this this DT blog-dshr-org-2370 79 3 light light NN blog-dshr-org-2370 79 4 , , , blog-dshr-org-2370 79 5 the the DT blog-dshr-org-2370 79 6 idea idea NN blog-dshr-org-2370 79 7 that that IN blog-dshr-org-2370 79 8 NSA NSA NNP blog-dshr-org-2370 79 9 should should MD blog-dshr-org-2370 79 10 stockpile stockpile VB blog-dshr-org-2370 79 11 0-days 0-days CD blog-dshr-org-2370 79 12 for for IN blog-dshr-org-2370 79 13 possible possible JJ blog-dshr-org-2370 79 14 future future JJ blog-dshr-org-2370 79 15 use use NN blog-dshr-org-2370 79 16 is be VBZ blog-dshr-org-2370 79 17 counter counter NN blog-dshr-org-2370 79 18 - - NN blog-dshr-org-2370 79 19 productive productive JJ blog-dshr-org-2370 79 20 . . . blog-dshr-org-2370 80 1 At at IN blog-dshr-org-2370 80 2 any any DT blog-dshr-org-2370 80 3 time time NN blog-dshr-org-2370 80 4 0-days 0-day NNS blog-dshr-org-2370 80 5 in in IN blog-dshr-org-2370 80 6 the the DT blog-dshr-org-2370 80 7 hoard hoard NN blog-dshr-org-2370 80 8 might may MD blog-dshr-org-2370 80 9 leak leak VB blog-dshr-org-2370 80 10 , , , blog-dshr-org-2370 80 11 or or CC blog-dshr-org-2370 80 12 be be VB blog-dshr-org-2370 80 13 independently independently RB blog-dshr-org-2370 80 14 discovered discover VBN blog-dshr-org-2370 80 15 . . . blog-dshr-org-2370 81 1 In in IN blog-dshr-org-2370 81 2 the the DT blog-dshr-org-2370 81 3 past past NN blog-dshr-org-2370 81 4 the the DT blog-dshr-org-2370 81 5 fallout fallout NN blog-dshr-org-2370 81 6 from from IN blog-dshr-org-2370 81 7 this this DT blog-dshr-org-2370 81 8 was be VBD blog-dshr-org-2370 81 9 limited limit VBN blog-dshr-org-2370 81 10 , , , blog-dshr-org-2370 81 11 but but CC blog-dshr-org-2370 81 12 no no RB blog-dshr-org-2370 81 13 longer longer RB blog-dshr-org-2370 81 14 ; ; : blog-dshr-org-2370 81 15 they -PRON- PRP blog-dshr-org-2370 81 16 might may MD blog-dshr-org-2370 81 17 be be VB blog-dshr-org-2370 81 18 used use VBN blog-dshr-org-2370 81 19 for for IN blog-dshr-org-2370 81 20 a a DT blog-dshr-org-2370 81 21 major major JJ blog-dshr-org-2370 81 22 ransomware ransomware NN blog-dshr-org-2370 81 23 attack attack NN blog-dshr-org-2370 81 24 . . . blog-dshr-org-2370 82 1 Is be VBZ blog-dshr-org-2370 82 2 the the DT blog-dshr-org-2370 82 3 National National NNP blog-dshr-org-2370 82 4 Security Security NNP blog-dshr-org-2370 82 5 Agency Agency NNP blog-dshr-org-2370 82 6 's 's POS blog-dshr-org-2370 82 7 mission mission NN blog-dshr-org-2370 82 8 to to TO blog-dshr-org-2370 82 9 secure secure VB blog-dshr-org-2370 82 10 the the DT blog-dshr-org-2370 82 11 United United NNP blog-dshr-org-2370 82 12 States States NNP blog-dshr-org-2370 82 13 , , , blog-dshr-org-2370 82 14 or or CC blog-dshr-org-2370 82 15 to to TO blog-dshr-org-2370 82 16 have have VB blog-dshr-org-2370 82 17 fun fun JJ blog-dshr-org-2370 82 18 playing play VBG blog-dshr-org-2370 82 19 Team Team NNP blog-dshr-org-2370 82 20 America America NNP blog-dshr-org-2370 82 21 : : : blog-dshr-org-2370 82 22 World World NNP blog-dshr-org-2370 82 23 Police Police NNPS blog-dshr-org-2370 82 24 in in IN blog-dshr-org-2370 82 25 cyberspace cyberspace NN blog-dshr-org-2370 82 26 ? ? . blog-dshr-org-2370 83 1 Unless unless IN blog-dshr-org-2370 83 2 they -PRON- PRP blog-dshr-org-2370 83 3 are be VBP blog-dshr-org-2370 83 4 immediately immediately RB blog-dshr-org-2370 83 5 required require VBN blog-dshr-org-2370 83 6 for for IN blog-dshr-org-2370 83 7 a a DT blog-dshr-org-2370 83 8 specific specific JJ blog-dshr-org-2370 83 9 operation operation NN blog-dshr-org-2370 83 10 , , , blog-dshr-org-2370 83 11 the the DT blog-dshr-org-2370 83 12 NSA NSA NNP blog-dshr-org-2370 83 13 should should MD blog-dshr-org-2370 83 14 disclose disclose VB blog-dshr-org-2370 83 15 0-days 0-days CD blog-dshr-org-2370 83 16 it -PRON- PRP blog-dshr-org-2370 83 17 discovers discover VBZ blog-dshr-org-2370 83 18 or or CC blog-dshr-org-2370 83 19 purchases purchase NNS blog-dshr-org-2370 83 20 to to IN blog-dshr-org-2370 83 21 the the DT blog-dshr-org-2370 83 22 software software NN blog-dshr-org-2370 83 23 vendor vendor NN blog-dshr-org-2370 83 24 , , , blog-dshr-org-2370 83 25 and and CC blog-dshr-org-2370 83 26 once once RB blog-dshr-org-2370 83 27 patched patch VBN blog-dshr-org-2370 83 28 , , , blog-dshr-org-2370 83 29 add add VB blog-dshr-org-2370 83 30 them -PRON- PRP blog-dshr-org-2370 83 31 to to IN blog-dshr-org-2370 83 32 the the DT blog-dshr-org-2370 83 33 kit kit NN blog-dshr-org-2370 83 34 it -PRON- PRP blog-dshr-org-2370 83 35 uses use VBZ blog-dshr-org-2370 83 36 to to TO blog-dshr-org-2370 83 37 run run VB blog-dshr-org-2370 83 38 its -PRON- PRP$ blog-dshr-org-2370 83 39 " " `` blog-dshr-org-2370 83 40 ransomware ransomware NN blog-dshr-org-2370 83 41 " " '' blog-dshr-org-2370 83 42 program program NN blog-dshr-org-2370 83 43 . . . blog-dshr-org-2370 84 1 To to TO blog-dshr-org-2370 84 2 do do VB blog-dshr-org-2370 84 3 less less JJR blog-dshr-org-2370 84 4 is be VBZ blog-dshr-org-2370 84 5 to to TO blog-dshr-org-2370 84 6 place place VB blog-dshr-org-2370 84 7 the the DT blog-dshr-org-2370 84 8 US US NNP blog-dshr-org-2370 84 9 economy economy NN blog-dshr-org-2370 84 10 at at IN blog-dshr-org-2370 84 11 risk risk NN blog-dshr-org-2370 84 12 . . . blog-dshr-org-2370 85 1 PS PS NNP blog-dshr-org-2370 85 2 : : : blog-dshr-org-2370 85 3 David David NNP blog-dshr-org-2370 85 4 Sanger Sanger NNP blog-dshr-org-2370 85 5 reported report VBD blog-dshr-org-2370 85 6 Tuesday Tuesday NNP blog-dshr-org-2370 85 7 that that IN blog-dshr-org-2370 85 8 Russia Russia NNP blog-dshr-org-2370 85 9 ’s ’s POS blog-dshr-org-2370 85 10 most most RBS blog-dshr-org-2370 85 11 aggressive aggressive JJ blog-dshr-org-2370 85 12 ransomware ransomware NNP blog-dshr-org-2370 85 13 group group NN blog-dshr-org-2370 85 14 disappeared disappear VBD blog-dshr-org-2370 85 15 . . . blog-dshr-org-2370 86 1 It -PRON- PRP blog-dshr-org-2370 86 2 ’s ’ VBZ blog-dshr-org-2370 86 3 unclear unclear JJ blog-dshr-org-2370 86 4 who who WP blog-dshr-org-2370 86 5 disabled disable VBD blog-dshr-org-2370 86 6 them -PRON- PRP blog-dshr-org-2370 86 7 . . . blog-dshr-org-2370 87 1 : : : blog-dshr-org-2370 87 2 Just just RB blog-dshr-org-2370 87 3 days day NNS blog-dshr-org-2370 87 4 after after IN blog-dshr-org-2370 87 5 President President NNP blog-dshr-org-2370 87 6 Biden Biden NNP blog-dshr-org-2370 87 7 demanded demand VBD blog-dshr-org-2370 87 8 that that IN blog-dshr-org-2370 87 9 President President NNP blog-dshr-org-2370 87 10 Vladimir Vladimir NNP blog-dshr-org-2370 87 11 V. V. NNP blog-dshr-org-2370 87 12 Putin Putin NNP blog-dshr-org-2370 87 13 of of IN blog-dshr-org-2370 87 14 Russia Russia NNP blog-dshr-org-2370 87 15 shut shut VBD blog-dshr-org-2370 87 16 down down RP blog-dshr-org-2370 87 17 ransomware ransomware NN blog-dshr-org-2370 87 18 groups group NNS blog-dshr-org-2370 87 19 attacking attack VBG blog-dshr-org-2370 87 20 American american JJ blog-dshr-org-2370 87 21 targets target NNS blog-dshr-org-2370 87 22 , , , blog-dshr-org-2370 87 23 the the DT blog-dshr-org-2370 87 24 most most RBS blog-dshr-org-2370 87 25 aggressive aggressive JJ blog-dshr-org-2370 87 26 of of IN blog-dshr-org-2370 87 27 the the DT blog-dshr-org-2370 87 28 groups group NNS blog-dshr-org-2370 87 29 suddenly suddenly RB blog-dshr-org-2370 87 30 went go VBD blog-dshr-org-2370 87 31 off off JJ blog-dshr-org-2370 87 32 - - HYPH blog-dshr-org-2370 87 33 line line NN blog-dshr-org-2370 87 34 early early JJ blog-dshr-org-2370 87 35 Tuesday Tuesday NNP blog-dshr-org-2370 87 36 . . . blog-dshr-org-2370 88 1 ... ... : blog-dshr-org-2370 88 2 A a DT blog-dshr-org-2370 88 3 third third JJ blog-dshr-org-2370 88 4 theory theory NN blog-dshr-org-2370 88 5 is be VBZ blog-dshr-org-2370 88 6 that that IN blog-dshr-org-2370 88 7 REvil REvil NNP blog-dshr-org-2370 88 8 decided decide VBD blog-dshr-org-2370 88 9 that that IN blog-dshr-org-2370 88 10 the the DT blog-dshr-org-2370 88 11 heat heat NN blog-dshr-org-2370 88 12 was be VBD blog-dshr-org-2370 88 13 too too RB blog-dshr-org-2370 88 14 intense intense JJ blog-dshr-org-2370 88 15 , , , blog-dshr-org-2370 88 16 and and CC blog-dshr-org-2370 88 17 took take VBD blog-dshr-org-2370 88 18 the the DT blog-dshr-org-2370 88 19 sites site NNS blog-dshr-org-2370 88 20 down down IN blog-dshr-org-2370 88 21 itself -PRON- PRP blog-dshr-org-2370 88 22 to to TO blog-dshr-org-2370 88 23 avoid avoid VB blog-dshr-org-2370 88 24 becoming become VBG blog-dshr-org-2370 88 25 caught catch VBN blog-dshr-org-2370 88 26 in in IN blog-dshr-org-2370 88 27 the the DT blog-dshr-org-2370 88 28 crossfire crossfire NN blog-dshr-org-2370 88 29 between between IN blog-dshr-org-2370 88 30 the the DT blog-dshr-org-2370 88 31 American american JJ blog-dshr-org-2370 88 32 and and CC blog-dshr-org-2370 88 33 Russian russian JJ blog-dshr-org-2370 88 34 presidents president NNS blog-dshr-org-2370 88 35 . . . blog-dshr-org-2370 89 1 That that DT blog-dshr-org-2370 89 2 is be VBZ blog-dshr-org-2370 89 3 what what WP blog-dshr-org-2370 89 4 another another DT blog-dshr-org-2370 89 5 Russian Russian NNP blog-dshr-org-2370 89 6 - - HYPH blog-dshr-org-2370 89 7 based base VBN blog-dshr-org-2370 89 8 group group NN blog-dshr-org-2370 89 9 , , , blog-dshr-org-2370 89 10 DarkSide DarkSide NNP blog-dshr-org-2370 89 11 , , , blog-dshr-org-2370 89 12 did do VBD blog-dshr-org-2370 89 13 after after IN blog-dshr-org-2370 89 14 the the DT blog-dshr-org-2370 89 15 ransomware ransomware JJ blog-dshr-org-2370 89 16 attack attack NN blog-dshr-org-2370 89 17 on on IN blog-dshr-org-2370 89 18 Colonial Colonial NNP blog-dshr-org-2370 89 19 Pipeline Pipeline NNP blog-dshr-org-2370 89 20 , , , blog-dshr-org-2370 89 21 ... ... : blog-dshr-org-2370 90 1 But but CC blog-dshr-org-2370 90 2 many many JJ blog-dshr-org-2370 90 3 experts expert NNS blog-dshr-org-2370 90 4 think think VBP blog-dshr-org-2370 90 5 that that IN blog-dshr-org-2370 90 6 DarkSide DarkSide NNP blog-dshr-org-2370 90 7 ’s ’s POS blog-dshr-org-2370 90 8 going go VBG blog-dshr-org-2370 90 9 - - HYPH blog-dshr-org-2370 90 10 out out IN blog-dshr-org-2370 90 11 - - HYPH blog-dshr-org-2370 90 12 of of IN blog-dshr-org-2370 90 13 - - HYPH blog-dshr-org-2370 90 14 business business NN blog-dshr-org-2370 90 15 move move NN blog-dshr-org-2370 90 16 was be VBD blog-dshr-org-2370 90 17 nothing nothing NN blog-dshr-org-2370 90 18 but but IN blog-dshr-org-2370 90 19 digital digital JJ blog-dshr-org-2370 90 20 theater theater NN blog-dshr-org-2370 90 21 , , , blog-dshr-org-2370 90 22 and and CC blog-dshr-org-2370 90 23 that that IN blog-dshr-org-2370 90 24 all all DT blog-dshr-org-2370 90 25 of of IN blog-dshr-org-2370 90 26 the the DT blog-dshr-org-2370 90 27 group group NN blog-dshr-org-2370 90 28 ’s ’s POS blog-dshr-org-2370 90 29 key key JJ blog-dshr-org-2370 90 30 ransomware ransomware NN blog-dshr-org-2370 90 31 talent talent NN blog-dshr-org-2370 90 32 will will MD blog-dshr-org-2370 90 33 reassemble reassemble VB blog-dshr-org-2370 90 34 under under IN blog-dshr-org-2370 90 35 a a DT blog-dshr-org-2370 90 36 different different JJ blog-dshr-org-2370 90 37 name name NN blog-dshr-org-2370 90 38 . . . blog-dshr-org-2370 91 1 This this DT blog-dshr-org-2370 91 2 is be VBZ blog-dshr-org-2370 91 3 by by IN blog-dshr-org-2370 91 4 far far RB blog-dshr-org-2370 91 5 the the DT blog-dshr-org-2370 91 6 most most RBS blog-dshr-org-2370 91 7 likely likely JJ blog-dshr-org-2370 91 8 explanation explanation NN blog-dshr-org-2370 91 9 for for IN blog-dshr-org-2370 91 10 REvil REvil NNP blog-dshr-org-2370 91 11 's 's POS blog-dshr-org-2370 91 12 disappearance disappearance NN blog-dshr-org-2370 91 13 , , , blog-dshr-org-2370 91 14 leaving leave VBG blog-dshr-org-2370 91 15 victims victim NNS blog-dshr-org-2370 91 16 unable unable JJ blog-dshr-org-2370 91 17 to to TO blog-dshr-org-2370 91 18 pay pay VB blog-dshr-org-2370 91 19 . . . blog-dshr-org-2370 92 1 The the DT blog-dshr-org-2370 92 2 same same JJ blog-dshr-org-2370 92 3 day day NN blog-dshr-org-2370 92 4 , , , blog-dshr-org-2370 92 5 Bogdan Bogdan NNP blog-dshr-org-2370 92 6 Botezatu Botezatu NNP blog-dshr-org-2370 92 7 and and CC blog-dshr-org-2370 92 8 Radu Radu NNP blog-dshr-org-2370 92 9 Tudorica Tudorica NNP blog-dshr-org-2370 92 10 reported report VBD blog-dshr-org-2370 92 11 that that IN blog-dshr-org-2370 92 12 Trickbot Trickbot NNP blog-dshr-org-2370 92 13 Activity Activity NNP blog-dshr-org-2370 92 14 Increases Increases NNPS blog-dshr-org-2370 92 15 ; ; : blog-dshr-org-2370 92 16 new new JJ blog-dshr-org-2370 92 17 VNC VNC NNP blog-dshr-org-2370 92 18 Module Module NNP blog-dshr-org-2370 92 19 On on IN blog-dshr-org-2370 92 20 the the DT blog-dshr-org-2370 92 21 Radar radar NN blog-dshr-org-2370 92 22 : : : blog-dshr-org-2370 92 23 The the DT blog-dshr-org-2370 92 24 Trickbot Trickbot NNP blog-dshr-org-2370 92 25 group group NN blog-dshr-org-2370 92 26 , , , blog-dshr-org-2370 92 27 which which WDT blog-dshr-org-2370 92 28 has have VBZ blog-dshr-org-2370 92 29 infected infect VBN blog-dshr-org-2370 92 30 millions million NNS blog-dshr-org-2370 92 31 of of IN blog-dshr-org-2370 92 32 computers computer NNS blog-dshr-org-2370 92 33 worldwide worldwide RB blog-dshr-org-2370 92 34 , , , blog-dshr-org-2370 92 35 has have VBZ blog-dshr-org-2370 92 36 recently recently RB blog-dshr-org-2370 92 37 played play VBN blog-dshr-org-2370 92 38 an an DT blog-dshr-org-2370 92 39 active active JJ blog-dshr-org-2370 92 40 role role NN blog-dshr-org-2370 92 41 in in IN blog-dshr-org-2370 92 42 disseminating disseminate VBG blog-dshr-org-2370 92 43 ransomware ransomware NN blog-dshr-org-2370 92 44 . . . blog-dshr-org-2370 93 1 We -PRON- PRP blog-dshr-org-2370 93 2 have have VBP blog-dshr-org-2370 93 3 been be VBN blog-dshr-org-2370 93 4 reporting report VBG blog-dshr-org-2370 93 5 on on IN blog-dshr-org-2370 93 6 notable notable JJ blog-dshr-org-2370 93 7 developments development NNS blog-dshr-org-2370 93 8 in in IN blog-dshr-org-2370 93 9 Trickbot Trickbot NNP blog-dshr-org-2370 93 10 ’s ’s POS blog-dshr-org-2370 93 11 lifecycle lifecycle NN blog-dshr-org-2370 93 12 , , , blog-dshr-org-2370 93 13 with with IN blog-dshr-org-2370 93 14 highlights highlight NNS blog-dshr-org-2370 93 15 including include VBG blog-dshr-org-2370 93 16 the the DT blog-dshr-org-2370 93 17 analysis analysis NN blog-dshr-org-2370 93 18 in in IN blog-dshr-org-2370 93 19 2020 2020 CD blog-dshr-org-2370 93 20 of of IN blog-dshr-org-2370 93 21 one one CD blog-dshr-org-2370 93 22 of of IN blog-dshr-org-2370 93 23 its -PRON- PRP$ blog-dshr-org-2370 93 24 modules module NNS blog-dshr-org-2370 93 25 used use VBN blog-dshr-org-2370 93 26 to to TO blog-dshr-org-2370 93 27 bruteforce bruteforce VB blog-dshr-org-2370 93 28 RDP RDP NNP blog-dshr-org-2370 93 29 connections connection NNS blog-dshr-org-2370 93 30 and and CC blog-dshr-org-2370 93 31 an an DT blog-dshr-org-2370 93 32 analysis analysis NN blog-dshr-org-2370 93 33 of of IN blog-dshr-org-2370 93 34 its -PRON- PRP$ blog-dshr-org-2370 93 35 new new JJ blog-dshr-org-2370 93 36 C2 c2 NN blog-dshr-org-2370 93 37 infrastructure infrastructure NN blog-dshr-org-2370 93 38 in in IN blog-dshr-org-2370 93 39 the the DT blog-dshr-org-2370 93 40 wake wake NN blog-dshr-org-2370 93 41 of of IN blog-dshr-org-2370 93 42 the the DT blog-dshr-org-2370 93 43 massive massive JJ blog-dshr-org-2370 93 44 crackdown crackdown NN blog-dshr-org-2370 93 45 in in IN blog-dshr-org-2370 93 46 October October NNP blog-dshr-org-2370 93 47 2020 2020 CD blog-dshr-org-2370 93 48 . . . blog-dshr-org-2370 94 1 Despite despite IN blog-dshr-org-2370 94 2 the the DT blog-dshr-org-2370 94 3 takedown takedown NN blog-dshr-org-2370 94 4 attempt attempt NN blog-dshr-org-2370 94 5 , , , blog-dshr-org-2370 94 6 Trickbot Trickbot NNP blog-dshr-org-2370 94 7 is be VBZ blog-dshr-org-2370 94 8 more more RBR blog-dshr-org-2370 94 9 active active JJ blog-dshr-org-2370 94 10 than than IN blog-dshr-org-2370 94 11 ever ever RB blog-dshr-org-2370 94 12 . . . blog-dshr-org-2370 95 1 In in IN blog-dshr-org-2370 95 2 May May NNP blog-dshr-org-2370 95 3 2021 2021 CD blog-dshr-org-2370 95 4 , , , blog-dshr-org-2370 95 5 our -PRON- PRP$ blog-dshr-org-2370 95 6 systems system NNS blog-dshr-org-2370 95 7 started start VBD blog-dshr-org-2370 95 8 to to TO blog-dshr-org-2370 95 9 pick pick VB blog-dshr-org-2370 95 10 up up RP blog-dshr-org-2370 95 11 an an DT blog-dshr-org-2370 95 12 updated update VBN blog-dshr-org-2370 95 13 version version NN blog-dshr-org-2370 95 14 of of IN blog-dshr-org-2370 95 15 the the DT blog-dshr-org-2370 95 16 vncDll vncDll NNP blog-dshr-org-2370 95 17 module module NN blog-dshr-org-2370 95 18 that that WDT blog-dshr-org-2370 95 19 Trickbot Trickbot NNP blog-dshr-org-2370 95 20 uses use VBZ blog-dshr-org-2370 95 21 against against IN blog-dshr-org-2370 95 22 select select JJ blog-dshr-org-2370 95 23 high high JJ blog-dshr-org-2370 95 24 - - HYPH blog-dshr-org-2370 95 25 profile profile NN blog-dshr-org-2370 95 26 targets target NNS blog-dshr-org-2370 95 27 . . . blog-dshr-org-2370 96 1 As as IN blog-dshr-org-2370 96 2 regards regard VBZ blog-dshr-org-2370 96 3 the the DT blog-dshr-org-2370 96 4 " " `` blog-dshr-org-2370 96 5 massive massive JJ blog-dshr-org-2370 96 6 crackdown crackdown NN blog-dshr-org-2370 96 7 " " '' blog-dshr-org-2370 96 8 , , , blog-dshr-org-2370 96 9 Ravie Ravie NNP blog-dshr-org-2370 96 10 Lakshmanan Lakshmanan NNP blog-dshr-org-2370 96 11 notes note VBZ blog-dshr-org-2370 96 12 : : : blog-dshr-org-2370 96 13 The the DT blog-dshr-org-2370 96 14 botnet botnet NN blog-dshr-org-2370 96 15 has have VBZ blog-dshr-org-2370 96 16 since since RB blog-dshr-org-2370 96 17 survived survive VBN blog-dshr-org-2370 96 18 two two CD blog-dshr-org-2370 96 19 takedown takedown NN blog-dshr-org-2370 96 20 attempts attempt NNS blog-dshr-org-2370 96 21 by by IN blog-dshr-org-2370 96 22 Microsoft Microsoft NNP blog-dshr-org-2370 96 23 and and CC blog-dshr-org-2370 96 24 the the DT blog-dshr-org-2370 96 25 U.S. U.S. NNP blog-dshr-org-2370 96 26 Cyber Cyber NNP blog-dshr-org-2370 96 27 Command Command NNP blog-dshr-org-2370 96 28 , , , blog-dshr-org-2370 96 29 Update update NN blog-dshr-org-2370 96 30 : : : blog-dshr-org-2370 96 31 Source source NN blog-dshr-org-2370 96 32 Via Via NNP blog-dshr-org-2370 96 33 Barry Barry NNP blog-dshr-org-2370 96 34 Ritholtz Ritholtz NNP blog-dshr-org-2370 96 35 we -PRON- PRP blog-dshr-org-2370 96 36 find find VBP blog-dshr-org-2370 96 37 this this DT blog-dshr-org-2370 96 38 evidence evidence NN blog-dshr-org-2370 96 39 of of IN blog-dshr-org-2370 96 40 Willie Willie NNP blog-dshr-org-2370 96 41 Sutton Sutton NNP blog-dshr-org-2370 96 42 's 's POS blog-dshr-org-2370 96 43 law law NN blog-dshr-org-2370 96 44 in in IN blog-dshr-org-2370 96 45 action action NN blog-dshr-org-2370 96 46 . . . blog-dshr-org-2370 97 1 When when WRB blog-dshr-org-2370 97 2 asked ask VBN blog-dshr-org-2370 97 3 " " `` blog-dshr-org-2370 97 4 Why why WRB blog-dshr-org-2370 97 5 do do VBP blog-dshr-org-2370 97 6 you -PRON- PRP blog-dshr-org-2370 97 7 rob rob VB blog-dshr-org-2370 97 8 banks bank NNS blog-dshr-org-2370 97 9 ? ? . blog-dshr-org-2370 98 1 " " `` blog-dshr-org-2370 98 2 , , , blog-dshr-org-2370 98 3 Sutton Sutton NNP blog-dshr-org-2370 98 4 replied reply VBD blog-dshr-org-2370 98 5 " " `` blog-dshr-org-2370 98 6 Because because IN blog-dshr-org-2370 98 7 that that DT blog-dshr-org-2370 98 8 's be VBZ blog-dshr-org-2370 98 9 where where WRB blog-dshr-org-2370 98 10 the the DT blog-dshr-org-2370 98 11 money money NN blog-dshr-org-2370 98 12 is be VBZ blog-dshr-org-2370 98 13 . . . blog-dshr-org-2370 98 14 " " '' blog-dshr-org-2370 99 1 Source source NN blog-dshr-org-2370 99 2 And and CC blog-dshr-org-2370 99 3 , , , blog-dshr-org-2370 99 4 thanks thank NNS blog-dshr-org-2370 99 5 to to IN blog-dshr-org-2370 99 6 Jack Jack NNP blog-dshr-org-2370 99 7 Cable Cable NNP blog-dshr-org-2370 99 8 , , , blog-dshr-org-2370 99 9 there there EX blog-dshr-org-2370 99 10 's be VBZ blog-dshr-org-2370 99 11 now now RB blog-dshr-org-2370 99 12 ransomwhe.re ransomwhe.re ADD blog-dshr-org-2370 99 13 , , , blog-dshr-org-2370 99 14 which which WDT blog-dshr-org-2370 99 15 tracks track VBZ blog-dshr-org-2370 99 16 ransomware ransomware VBP blog-dshr-org-2370 99 17 payments payment NNS blog-dshr-org-2370 99 18 in in IN blog-dshr-org-2370 99 19 real real JJ blog-dshr-org-2370 99 20 time time NN blog-dshr-org-2370 99 21 . . . blog-dshr-org-2370 100 1 It -PRON- PRP blog-dshr-org-2370 100 2 suffers suffer VBZ blog-dshr-org-2370 100 3 a a DT blog-dshr-org-2370 100 4 bit bit NN blog-dshr-org-2370 100 5 from from IN blog-dshr-org-2370 100 6 incomplete incomplete JJ blog-dshr-org-2370 100 7 data datum NNS blog-dshr-org-2370 100 8 . . . blog-dshr-org-2370 101 1 Because because IN blog-dshr-org-2370 101 2 it -PRON- PRP blog-dshr-org-2370 101 3 depends depend VBZ blog-dshr-org-2370 101 4 upon upon IN blog-dshr-org-2370 101 5 tracking track VBG blog-dshr-org-2370 101 6 Bitcoin Bitcoin NNP blog-dshr-org-2370 101 7 addresses address NNS blog-dshr-org-2370 101 8 , , , blog-dshr-org-2370 101 9 it -PRON- PRP blog-dshr-org-2370 101 10 will will MD blog-dshr-org-2370 101 11 miss miss VB blog-dshr-org-2370 101 12 the the DT blog-dshr-org-2370 101 13 increasing increase VBG blog-dshr-org-2370 101 14 proportion proportion NN blog-dshr-org-2370 101 15 of of IN blog-dshr-org-2370 101 16 demands demand NNS blog-dshr-org-2370 101 17 that that WDT blog-dshr-org-2370 101 18 insist insist VBP blog-dshr-org-2370 101 19 on on IN blog-dshr-org-2370 101 20 Monero Monero NNP blog-dshr-org-2370 101 21 . . . blog-dshr-org-2370 102 1 Posted post VBN blog-dshr-org-2370 102 2 by by IN blog-dshr-org-2370 102 3 David David NNP blog-dshr-org-2370 102 4 . . . blog-dshr-org-2370 103 1 at at IN blog-dshr-org-2370 103 2 8:00 8:00 CD blog-dshr-org-2370 103 3 AM AM NNP blog-dshr-org-2370 103 4 Labels Labels NNPS blog-dshr-org-2370 103 5 : : : blog-dshr-org-2370 103 6 malware malware NNP blog-dshr-org-2370 103 7 , , , blog-dshr-org-2370 103 8 security security NN blog-dshr-org-2370 103 9 16 16 CD blog-dshr-org-2370 103 10 comments comment NNS blog-dshr-org-2370 103 11 : : : blog-dshr-org-2370 103 12 Unknown unknown JJ blog-dshr-org-2370 103 13 said say VBD blog-dshr-org-2370 103 14 ... ... : blog-dshr-org-2370 103 15 Companies company NNS blog-dshr-org-2370 103 16 could could MD blog-dshr-org-2370 103 17 also also RB blog-dshr-org-2370 103 18 stop stop VB blog-dshr-org-2370 103 19 creating create VBG blog-dshr-org-2370 103 20 monoculture monoculture NN blog-dshr-org-2370 103 21 networks network NNS blog-dshr-org-2370 103 22 that that WDT blog-dshr-org-2370 103 23 are be VBP blog-dshr-org-2370 103 24 easy easy JJ blog-dshr-org-2370 103 25 to to TO blog-dshr-org-2370 103 26 manage manage VB blog-dshr-org-2370 103 27 and and CC blog-dshr-org-2370 103 28 also also RB blog-dshr-org-2370 103 29 easy easy JJ blog-dshr-org-2370 103 30 to to TO blog-dshr-org-2370 103 31 compromise compromise VB blog-dshr-org-2370 103 32 . . . blog-dshr-org-2370 104 1 When when WRB blog-dshr-org-2370 104 2 every every DT blog-dshr-org-2370 104 3 device device NN blog-dshr-org-2370 104 4 is be VBZ blog-dshr-org-2370 104 5 a a DT blog-dshr-org-2370 104 6 domain domain NN blog-dshr-org-2370 104 7 joined join VBN blog-dshr-org-2370 104 8 Windows Windows NNP blog-dshr-org-2370 104 9 10 10 CD blog-dshr-org-2370 104 10 machine machine NN blog-dshr-org-2370 104 11 running run VBG blog-dshr-org-2370 104 12 some some DT blog-dshr-org-2370 104 13 low low JJ blog-dshr-org-2370 104 14 level level NN blog-dshr-org-2370 104 15 centralized centralize VBN blog-dshr-org-2370 104 16 remote remote JJ blog-dshr-org-2370 104 17 management management NN blog-dshr-org-2370 104 18 system system NN blog-dshr-org-2370 104 19 , , , blog-dshr-org-2370 104 20 it -PRON- PRP blog-dshr-org-2370 104 21 's be VBZ blog-dshr-org-2370 104 22 just just RB blog-dshr-org-2370 104 23 a a DT blog-dshr-org-2370 104 24 matter matter NN blog-dshr-org-2370 104 25 of of IN blog-dshr-org-2370 104 26 time time NN blog-dshr-org-2370 104 27 before before IN blog-dshr-org-2370 104 28 you -PRON- PRP blog-dshr-org-2370 104 29 are be VBP blog-dshr-org-2370 104 30 completely completely RB blog-dshr-org-2370 104 31 owned own VBN blog-dshr-org-2370 104 32 . . . blog-dshr-org-2370 105 1 This this DT blog-dshr-org-2370 105 2 is be VBZ blog-dshr-org-2370 105 3 the the DT blog-dshr-org-2370 105 4 " " `` blog-dshr-org-2370 105 5 Encryption Encryption NNP blog-dshr-org-2370 105 6 Backdoor Backdoor NNP blog-dshr-org-2370 105 7 " " '' blog-dshr-org-2370 105 8 problem problem NN blog-dshr-org-2370 105 9 in in IN blog-dshr-org-2370 105 10 Computer Computer NNP blog-dshr-org-2370 105 11 Science Science NNP blog-dshr-org-2370 105 12 ( ( -LRB- blog-dshr-org-2370 105 13 aka aka RB blog-dshr-org-2370 105 14 " " `` blog-dshr-org-2370 105 15 Exceptional Exceptional NNP blog-dshr-org-2370 105 16 Access Access NNP blog-dshr-org-2370 105 17 Systems Systems NNPS blog-dshr-org-2370 105 18 " " '' blog-dshr-org-2370 105 19 ) ) -RRB- blog-dshr-org-2370 105 20 . . . blog-dshr-org-2370 106 1 It -PRON- PRP blog-dshr-org-2370 106 2 is be VBZ blog-dshr-org-2370 106 3 impossible impossible JJ blog-dshr-org-2370 106 4 to to TO blog-dshr-org-2370 106 5 build build VB blog-dshr-org-2370 106 6 an an DT blog-dshr-org-2370 106 7 exceptional exceptional JJ blog-dshr-org-2370 106 8 access access NN blog-dshr-org-2370 106 9 system system NN blog-dshr-org-2370 106 10 and and CC blog-dshr-org-2370 106 11 then then RB blog-dshr-org-2370 106 12 ensure ensure VB blog-dshr-org-2370 106 13 it -PRON- PRP blog-dshr-org-2370 106 14 is be VBZ blog-dshr-org-2370 106 15 only only RB blog-dshr-org-2370 106 16 used use VBN blog-dshr-org-2370 106 17 by by IN blog-dshr-org-2370 106 18 good good JJ blog-dshr-org-2370 106 19 people people NNS blog-dshr-org-2370 106 20 to to TO blog-dshr-org-2370 106 21 do do VB blog-dshr-org-2370 106 22 good good JJ blog-dshr-org-2370 106 23 things thing NNS blog-dshr-org-2370 106 24 . . . blog-dshr-org-2370 107 1 July July NNP blog-dshr-org-2370 107 2 15 15 CD blog-dshr-org-2370 107 3 , , , blog-dshr-org-2370 107 4 2021 2021 CD blog-dshr-org-2370 107 5 at at IN blog-dshr-org-2370 107 6 11:33 11:33 CD blog-dshr-org-2370 107 7 AM am NN blog-dshr-org-2370 107 8 David David NNP blog-dshr-org-2370 107 9 . . . blog-dshr-org-2370 108 1 said say VBD blog-dshr-org-2370 108 2 ... ... : blog-dshr-org-2370 108 3 Lorenzo Lorenzo NNP blog-dshr-org-2370 108 4 Franceschi Franceschi NNP blog-dshr-org-2370 108 5 - - HYPH blog-dshr-org-2370 108 6 Bicchierai Bicchierai NNP blog-dshr-org-2370 108 7 reports report VBZ blog-dshr-org-2370 108 8 on on IN blog-dshr-org-2370 108 9 today today NN blog-dshr-org-2370 108 10 's 's POS blog-dshr-org-2370 108 11 0-day 0-day NN blog-dshr-org-2370 108 12 news news NN blog-dshr-org-2370 108 13 in in IN blog-dshr-org-2370 108 14 Mysterious mysterious JJ blog-dshr-org-2370 108 15 Israeli Israeli NNP blog-dshr-org-2370 108 16 Spyware Spyware NNP blog-dshr-org-2370 108 17 Vendor Vendor NNP blog-dshr-org-2370 108 18 ’s ’s POS blog-dshr-org-2370 108 19 Windows Windows NNP blog-dshr-org-2370 108 20 Zero Zero NNP blog-dshr-org-2370 108 21 - - HYPH blog-dshr-org-2370 108 22 Days day NNS blog-dshr-org-2370 108 23 Caught catch VBN blog-dshr-org-2370 108 24 in in IN blog-dshr-org-2370 108 25 the the DT blog-dshr-org-2370 108 26 Wild Wild NNP blog-dshr-org-2370 108 27 : : : blog-dshr-org-2370 108 28 " " `` blog-dshr-org-2370 108 29 Citizen Citizen NNP blog-dshr-org-2370 108 30 Lab Lab NNP blog-dshr-org-2370 108 31 concluded conclude VBD blog-dshr-org-2370 108 32 that that IN blog-dshr-org-2370 108 33 the the DT blog-dshr-org-2370 108 34 malware malware NNP blog-dshr-org-2370 108 35 and and CC blog-dshr-org-2370 108 36 the the DT blog-dshr-org-2370 108 37 zero zero CD blog-dshr-org-2370 108 38 - - HYPH blog-dshr-org-2370 108 39 days day NNS blog-dshr-org-2370 108 40 were be VBD blog-dshr-org-2370 108 41 developed develop VBN blog-dshr-org-2370 108 42 by by IN blog-dshr-org-2370 108 43 Candiru Candiru NNP blog-dshr-org-2370 108 44 , , , blog-dshr-org-2370 108 45 a a DT blog-dshr-org-2370 108 46 mysterious mysterious JJ blog-dshr-org-2370 108 47 Israel Israel NNP blog-dshr-org-2370 108 48 - - HYPH blog-dshr-org-2370 108 49 based base VBN blog-dshr-org-2370 108 50 spyware spyware NN blog-dshr-org-2370 108 51 vendor vendor NN blog-dshr-org-2370 108 52 that that WDT blog-dshr-org-2370 108 53 offers offer VBZ blog-dshr-org-2370 108 54 “ " `` blog-dshr-org-2370 108 55 high high JJ blog-dshr-org-2370 108 56 - - HYPH blog-dshr-org-2370 108 57 end end NN blog-dshr-org-2370 108 58 cyber cyber NNP blog-dshr-org-2370 108 59 intelligence intelligence NN blog-dshr-org-2370 108 60 platform platform NN blog-dshr-org-2370 108 61 dedicated dedicate VBN blog-dshr-org-2370 108 62 to to TO blog-dshr-org-2370 108 63 infiltrate infiltrate VB blog-dshr-org-2370 108 64 PC pc NN blog-dshr-org-2370 108 65 computers computer NNS blog-dshr-org-2370 108 66 , , , blog-dshr-org-2370 108 67 networks network NNS blog-dshr-org-2370 108 68 , , , blog-dshr-org-2370 108 69 mobile mobile NN blog-dshr-org-2370 108 70 handsets handset NNS blog-dshr-org-2370 108 71 , , , blog-dshr-org-2370 108 72 " " '' blog-dshr-org-2370 108 73 according accord VBG blog-dshr-org-2370 108 74 to to IN blog-dshr-org-2370 108 75 a a DT blog-dshr-org-2370 108 76 document document NN blog-dshr-org-2370 108 77 seen see VBN blog-dshr-org-2370 108 78 by by IN blog-dshr-org-2370 108 79 Haaretz Haaretz NNP blog-dshr-org-2370 108 80 . . . blog-dshr-org-2370 109 1 Candiru Candiru NNP blog-dshr-org-2370 109 2 was be VBD blog-dshr-org-2370 109 3 first first RB blog-dshr-org-2370 109 4 outed out VBN blog-dshr-org-2370 109 5 by by IN blog-dshr-org-2370 109 6 the the DT blog-dshr-org-2370 109 7 Israeli israeli JJ blog-dshr-org-2370 109 8 newspaper newspaper NN blog-dshr-org-2370 109 9 in in IN blog-dshr-org-2370 109 10 2019 2019 CD blog-dshr-org-2370 109 11 , , , blog-dshr-org-2370 109 12 and and CC blog-dshr-org-2370 109 13 has have VBZ blog-dshr-org-2370 109 14 since since IN blog-dshr-org-2370 109 15 gotten get VBN blog-dshr-org-2370 109 16 some some DT blog-dshr-org-2370 109 17 attention attention NN blog-dshr-org-2370 109 18 from from IN blog-dshr-org-2370 109 19 cybersecurity cybersecurity NN blog-dshr-org-2370 109 20 companies company NNS blog-dshr-org-2370 109 21 such such JJ blog-dshr-org-2370 109 22 as as IN blog-dshr-org-2370 109 23 Kaspersky Kaspersky NNP blog-dshr-org-2370 109 24 Lab Lab NNP blog-dshr-org-2370 109 25 . . . blog-dshr-org-2370 109 26 " " '' blog-dshr-org-2370 110 1 July July NNP blog-dshr-org-2370 110 2 15 15 CD blog-dshr-org-2370 110 3 , , , blog-dshr-org-2370 110 4 2021 2021 CD blog-dshr-org-2370 110 5 at at IN blog-dshr-org-2370 110 6 12:02 12:02 CD blog-dshr-org-2370 110 7 PM PM NNP blog-dshr-org-2370 110 8 Alwyn Alwyn NNP blog-dshr-org-2370 110 9 Schoeman Schoeman NNP blog-dshr-org-2370 110 10 said say VBD blog-dshr-org-2370 110 11 ... ... : blog-dshr-org-2370 110 12 How how WRB blog-dshr-org-2370 110 13 could could MD blog-dshr-org-2370 110 14 we -PRON- PRP blog-dshr-org-2370 110 15 exploit exploit VB blog-dshr-org-2370 110 16 the the DT blog-dshr-org-2370 110 17 Russian Russian NNP blog-dshr-org-2370 110 18 Locale Locale NNP blog-dshr-org-2370 110 19 exception exception NN blog-dshr-org-2370 110 20 ? ? . blog-dshr-org-2370 111 1 July July NNP blog-dshr-org-2370 111 2 15 15 CD blog-dshr-org-2370 111 3 , , , blog-dshr-org-2370 111 4 2021 2021 CD blog-dshr-org-2370 111 5 at at IN blog-dshr-org-2370 111 6 5:17 5:17 CD blog-dshr-org-2370 111 7 PM pm NN blog-dshr-org-2370 111 8 Unknown Unknown NNP blog-dshr-org-2370 111 9 said say VBD blog-dshr-org-2370 111 10 ... ... : blog-dshr-org-2370 112 1 The the DT blog-dshr-org-2370 112 2 correct correct JJ blog-dshr-org-2370 112 3 response response NN blog-dshr-org-2370 112 4 is be VBZ blog-dshr-org-2370 112 5 to to TO blog-dshr-org-2370 112 6 copy copy VB blog-dshr-org-2370 112 7 the the DT blog-dshr-org-2370 112 8 law law NN blog-dshr-org-2370 112 9 that that WDT blog-dshr-org-2370 112 10 the the DT blog-dshr-org-2370 112 11 EU EU NNP blog-dshr-org-2370 112 12 passed pass VBD blog-dshr-org-2370 112 13 that that WDT blog-dshr-org-2370 112 14 can can MD blog-dshr-org-2370 112 15 fine fine VB blog-dshr-org-2370 112 16 companies company NNS blog-dshr-org-2370 112 17 up up IN blog-dshr-org-2370 112 18 to to TO blog-dshr-org-2370 112 19 10 10 CD blog-dshr-org-2370 112 20 % % NN blog-dshr-org-2370 112 21 of of IN blog-dshr-org-2370 112 22 revenue revenue NN blog-dshr-org-2370 112 23 for for IN blog-dshr-org-2370 112 24 lax lax JJ blog-dshr-org-2370 112 25 cyber cyber NNP blog-dshr-org-2370 112 26 security security NN blog-dshr-org-2370 112 27 . . . blog-dshr-org-2370 113 1 Equifax Equifax NNP blog-dshr-org-2370 113 2 , , , blog-dshr-org-2370 113 3 SolarWinds SolarWinds NNP blog-dshr-org-2370 113 4 and and CC blog-dshr-org-2370 113 5 Kaseya Kaseya NNP blog-dshr-org-2370 113 6 all all DT blog-dshr-org-2370 113 7 had have VBD blog-dshr-org-2370 113 8 lax lax VBN blog-dshr-org-2370 113 9 security security NN blog-dshr-org-2370 113 10 that that WDT blog-dshr-org-2370 113 11 caused cause VBD blog-dshr-org-2370 113 12 untold untold JJ blog-dshr-org-2370 113 13 damage damage NN blog-dshr-org-2370 113 14 to to IN blog-dshr-org-2370 113 15 businesses business NNS blog-dshr-org-2370 113 16 and and CC blog-dshr-org-2370 113 17 the the DT blog-dshr-org-2370 113 18 public public NN blog-dshr-org-2370 113 19 . . . blog-dshr-org-2370 114 1 I -PRON- PRP blog-dshr-org-2370 114 2 do do VBP blog-dshr-org-2370 114 3 not not RB blog-dshr-org-2370 114 4 support support VB blog-dshr-org-2370 114 5 letting let VBG blog-dshr-org-2370 114 6 cyber cyber JJ blog-dshr-org-2370 114 7 criminals criminal NNS blog-dshr-org-2370 114 8 get get VB blog-dshr-org-2370 114 9 away away RB blog-dshr-org-2370 114 10 without without IN blog-dshr-org-2370 114 11 punishment punishment NN blog-dshr-org-2370 114 12 , , , blog-dshr-org-2370 114 13 but but CC blog-dshr-org-2370 114 14 I -PRON- PRP blog-dshr-org-2370 114 15 do do VBP blog-dshr-org-2370 114 16 support support VB blog-dshr-org-2370 114 17 holding hold VBG blog-dshr-org-2370 114 18 companies company NNS blog-dshr-org-2370 114 19 liable liable JJ blog-dshr-org-2370 114 20 for for IN blog-dshr-org-2370 114 21 gross gross JJ blog-dshr-org-2370 114 22 negligence negligence NN blog-dshr-org-2370 114 23 in in IN blog-dshr-org-2370 114 24 cyber cyber NNP blog-dshr-org-2370 114 25 security security NN blog-dshr-org-2370 114 26 . . . blog-dshr-org-2370 115 1 July July NNP blog-dshr-org-2370 115 2 15 15 CD blog-dshr-org-2370 115 3 , , , blog-dshr-org-2370 115 4 2021 2021 CD blog-dshr-org-2370 115 5 at at IN blog-dshr-org-2370 115 6 9:17 9:17 CD blog-dshr-org-2370 115 7 PM PM NNP blog-dshr-org-2370 115 8 David David NNP blog-dshr-org-2370 115 9 . . . blog-dshr-org-2370 116 1 said say VBD blog-dshr-org-2370 116 2 ... ... : blog-dshr-org-2370 116 3 Brian Brian NNP blog-dshr-org-2370 116 4 Krebs Krebs NNP blog-dshr-org-2370 116 5 originally originally RB blog-dshr-org-2370 116 6 suggested suggest VBD blog-dshr-org-2370 116 7 to to TO blog-dshr-org-2370 116 8 Try try VB blog-dshr-org-2370 116 9 This this DT blog-dshr-org-2370 116 10 One one CD blog-dshr-org-2370 116 11 Weird Weird NNP blog-dshr-org-2370 116 12 Trick trick NN blog-dshr-org-2370 116 13 Russian russian JJ blog-dshr-org-2370 116 14 Hackers hacker NNS blog-dshr-org-2370 116 15 Hate Hate NNP blog-dshr-org-2370 116 16 by by IN blog-dshr-org-2370 116 17 installing instal VBG blog-dshr-org-2370 116 18 Russian russian JJ blog-dshr-org-2370 116 19 keyboard keyboard NN blog-dshr-org-2370 116 20 support support NN blog-dshr-org-2370 116 21 , , , blog-dshr-org-2370 116 22 but but CC blog-dshr-org-2370 116 23 the the DT blog-dshr-org-2370 116 24 bad bad JJ blog-dshr-org-2370 116 25 guys guy NNS blog-dshr-org-2370 116 26 figured figure VBD blog-dshr-org-2370 116 27 out out RP blog-dshr-org-2370 116 28 quickly quickly RB blog-dshr-org-2370 116 29 that that IN blog-dshr-org-2370 116 30 what what WP blog-dshr-org-2370 116 31 they -PRON- PRP blog-dshr-org-2370 116 32 needed need VBD blog-dshr-org-2370 116 33 to to TO blog-dshr-org-2370 116 34 test test VB blog-dshr-org-2370 116 35 was be VBD blog-dshr-org-2370 116 36 not not RB blog-dshr-org-2370 116 37 the the DT blog-dshr-org-2370 116 38 keyboard keyboard NN blog-dshr-org-2370 116 39 support support NN blog-dshr-org-2370 116 40 but but CC blog-dshr-org-2370 116 41 the the DT blog-dshr-org-2370 116 42 default default NN blog-dshr-org-2370 116 43 language language NN blog-dshr-org-2370 116 44 . . . blog-dshr-org-2370 117 1 So so CC blog-dshr-org-2370 117 2 unless unless IN blog-dshr-org-2370 117 3 you -PRON- PRP blog-dshr-org-2370 117 4 want want VBP blog-dshr-org-2370 117 5 your -PRON- PRP$ blog-dshr-org-2370 117 6 machine machine NN blog-dshr-org-2370 117 7 to to TO blog-dshr-org-2370 117 8 talk talk VB blog-dshr-org-2370 117 9 to to IN blog-dshr-org-2370 117 10 you -PRON- PRP blog-dshr-org-2370 117 11 in in IN blog-dshr-org-2370 117 12 Cyrillic Cyrillic NNP blog-dshr-org-2370 117 13 , , , blog-dshr-org-2370 117 14 forget forget VB blog-dshr-org-2370 117 15 it -PRON- PRP blog-dshr-org-2370 117 16 . . . blog-dshr-org-2370 118 1 Hat hat NN blog-dshr-org-2370 118 2 tip tip NN blog-dshr-org-2370 118 3 to to IN blog-dshr-org-2370 118 4 Bruce Bruce NNP blog-dshr-org-2370 118 5 Schneier Schneier NNP blog-dshr-org-2370 118 6 . . . blog-dshr-org-2370 119 1 July July NNP blog-dshr-org-2370 119 2 16 16 CD blog-dshr-org-2370 119 3 , , , blog-dshr-org-2370 119 4 2021 2021 CD blog-dshr-org-2370 119 5 at at IN blog-dshr-org-2370 119 6 7:20 7:20 CD blog-dshr-org-2370 119 7 AM am NN blog-dshr-org-2370 119 8 David David NNP blog-dshr-org-2370 119 9 . . . blog-dshr-org-2370 120 1 said say VBD blog-dshr-org-2370 120 2 ... ... : blog-dshr-org-2370 121 1 I -PRON- PRP blog-dshr-org-2370 121 2 ca can MD blog-dshr-org-2370 121 3 n't not RB blog-dshr-org-2370 121 4 find find VB blog-dshr-org-2370 121 5 anything anything NN blog-dshr-org-2370 121 6 that that WDT blog-dshr-org-2370 121 7 says say VBZ blog-dshr-org-2370 121 8 the the DT blog-dshr-org-2370 121 9 EU EU NNP blog-dshr-org-2370 121 10 can can MD blog-dshr-org-2370 121 11 impose impose VB blog-dshr-org-2370 121 12 10 10 CD blog-dshr-org-2370 121 13 % % NN blog-dshr-org-2370 121 14 of of IN blog-dshr-org-2370 121 15 revenue revenue NN blog-dshr-org-2370 121 16 . . . blog-dshr-org-2370 122 1 When when WRB blog-dshr-org-2370 122 2 the the DT blog-dshr-org-2370 122 3 UK UK NNP blog-dshr-org-2370 122 4 implemented implement VBD blog-dshr-org-2370 122 5 the the DT blog-dshr-org-2370 122 6 EU EU NNP blog-dshr-org-2370 122 7 regulations regulation NNS blog-dshr-org-2370 122 8 in in IN blog-dshr-org-2370 122 9 2018 2018 CD blog-dshr-org-2370 122 10 ( ( -LRB- blog-dshr-org-2370 122 11 my -PRON- PRP$ blog-dshr-org-2370 122 12 emphasis emphasis NN blog-dshr-org-2370 122 13 ) ) -RRB- blog-dshr-org-2370 122 14 : : : blog-dshr-org-2370 122 15 " " `` blog-dshr-org-2370 122 16 some some DT blog-dshr-org-2370 122 17 of of IN blog-dshr-org-2370 122 18 these these DT blog-dshr-org-2370 122 19 organisations organisation NNS blog-dshr-org-2370 122 20 could could MD blog-dshr-org-2370 122 21 be be VB blog-dshr-org-2370 122 22 liable liable JJ blog-dshr-org-2370 122 23 for for IN blog-dshr-org-2370 122 24 fines fine NNS blog-dshr-org-2370 122 25 of of IN blog-dshr-org-2370 122 26 up up IN blog-dshr-org-2370 122 27 to to TO blog-dshr-org-2370 122 28 £ £ $ blog-dshr-org-2370 122 29 17 17 CD blog-dshr-org-2370 122 30 million million CD blog-dshr-org-2370 122 31 - - : blog-dshr-org-2370 122 32 or or CC blog-dshr-org-2370 122 33 four four CD blog-dshr-org-2370 122 34 per per IN blog-dshr-org-2370 122 35 cent cent NN blog-dshr-org-2370 122 36 of of IN blog-dshr-org-2370 122 37 global global JJ blog-dshr-org-2370 122 38 turnover turnover NN blog-dshr-org-2370 122 39 - - : blog-dshr-org-2370 122 40 if if IN blog-dshr-org-2370 122 41 lax lax NN blog-dshr-org-2370 122 42 cyber cyber JJ blog-dshr-org-2370 122 43 security security NN blog-dshr-org-2370 122 44 standards standard NNS blog-dshr-org-2370 122 45 result result VBP blog-dshr-org-2370 122 46 in in IN blog-dshr-org-2370 122 47 loss loss NN blog-dshr-org-2370 122 48 of of IN blog-dshr-org-2370 122 49 service service NN blog-dshr-org-2370 122 50 under under IN blog-dshr-org-2370 122 51 the the DT blog-dshr-org-2370 122 52 Government Government NNP blog-dshr-org-2370 122 53 ’s ’s POS blog-dshr-org-2370 122 54 proposals proposal NNS blog-dshr-org-2370 122 55 to to TO blog-dshr-org-2370 122 56 implement implement VB blog-dshr-org-2370 122 57 the the DT blog-dshr-org-2370 122 58 EU EU NNP blog-dshr-org-2370 122 59 's 's POS blog-dshr-org-2370 122 60 Network Network NNP blog-dshr-org-2370 122 61 and and CC blog-dshr-org-2370 122 62 Information Information NNP blog-dshr-org-2370 122 63 Systems Systems NNPS blog-dshr-org-2370 122 64 ( ( -LRB- blog-dshr-org-2370 122 65 NIS NIS NNP blog-dshr-org-2370 122 66 ) ) -RRB- blog-dshr-org-2370 122 67 directive directive NN blog-dshr-org-2370 122 68 from from IN blog-dshr-org-2370 122 69 May May NNP blog-dshr-org-2370 122 70 2018 2018 CD blog-dshr-org-2370 122 71 . . . blog-dshr-org-2370 122 72 " " '' blog-dshr-org-2370 123 1 £ £ $ blog-dshr-org-2370 123 2 17 17 CD blog-dshr-org-2370 123 3 M m NN blog-dshr-org-2370 123 4 is be VBZ blog-dshr-org-2370 123 5 chickenfeed chickenfeed NN blog-dshr-org-2370 123 6 compared compare VBN blog-dshr-org-2370 123 7 to to IN blog-dshr-org-2370 123 8 the the DT blog-dshr-org-2370 123 9 damage damage NN blog-dshr-org-2370 123 10 , , , blog-dshr-org-2370 123 11 this this DT blog-dshr-org-2370 123 12 only only RB blog-dshr-org-2370 123 13 applies apply VBZ blog-dshr-org-2370 123 14 to to IN blog-dshr-org-2370 123 15 critical critical JJ blog-dshr-org-2370 123 16 infrastructure infrastructure NN blog-dshr-org-2370 123 17 , , , blog-dshr-org-2370 123 18 and and CC blog-dshr-org-2370 123 19 I -PRON- PRP blog-dshr-org-2370 123 20 do do VBP blog-dshr-org-2370 123 21 n't not RB blog-dshr-org-2370 123 22 see see VB blog-dshr-org-2370 123 23 any any DT blog-dshr-org-2370 123 24 evidence evidence NN blog-dshr-org-2370 123 25 that that IN blog-dshr-org-2370 123 26 the the DT blog-dshr-org-2370 123 27 EU EU NNP blog-dshr-org-2370 123 28 has have VBZ blog-dshr-org-2370 123 29 levied levy VBN blog-dshr-org-2370 123 30 any any DT blog-dshr-org-2370 123 31 such such JJ blog-dshr-org-2370 123 32 fines fine NNS blog-dshr-org-2370 123 33 . . . blog-dshr-org-2370 124 1 July July NNP blog-dshr-org-2370 124 2 16 16 CD blog-dshr-org-2370 124 3 , , , blog-dshr-org-2370 124 4 2021 2021 CD blog-dshr-org-2370 124 5 at at IN blog-dshr-org-2370 124 6 8:55 8:55 CD blog-dshr-org-2370 124 7 AM am VBP blog-dshr-org-2370 124 8 David David NNP blog-dshr-org-2370 124 9 . . . blog-dshr-org-2370 125 1 said say VBD blog-dshr-org-2370 125 2 ... ... : blog-dshr-org-2370 125 3 All all DT blog-dshr-org-2370 125 4 I -PRON- PRP blog-dshr-org-2370 125 5 could could MD blog-dshr-org-2370 125 6 find find VB blog-dshr-org-2370 125 7 for for IN blog-dshr-org-2370 125 8 the the DT blog-dshr-org-2370 125 9 US US NNP blog-dshr-org-2370 125 10 was be VBD blog-dshr-org-2370 125 11 this this DT blog-dshr-org-2370 125 12 from from IN blog-dshr-org-2370 125 13 2018 2018 CD blog-dshr-org-2370 125 14 : : : blog-dshr-org-2370 125 15 " " `` blog-dshr-org-2370 125 16 The the DT blog-dshr-org-2370 125 17 U.S U.S NNP blog-dshr-org-2370 125 18 Department Department NNP blog-dshr-org-2370 125 19 of of IN blog-dshr-org-2370 125 20 Health Health NNP blog-dshr-org-2370 125 21 and and CC blog-dshr-org-2370 125 22 Human Human NNP blog-dshr-org-2370 125 23 Services Services NNPS blog-dshr-org-2370 125 24 has have VBZ blog-dshr-org-2370 125 25 fined fine VBN blog-dshr-org-2370 125 26 Fresenius Fresenius NNP blog-dshr-org-2370 125 27 Medical Medical NNP blog-dshr-org-2370 125 28 Care Care NNP blog-dshr-org-2370 125 29 Holdings Holdings NNP blog-dshr-org-2370 125 30 Inc. Inc. NNP blog-dshr-org-2370 125 31 , , , blog-dshr-org-2370 125 32 a a DT blog-dshr-org-2370 125 33 major major JJ blog-dshr-org-2370 125 34 supplier supplier NN blog-dshr-org-2370 125 35 of of IN blog-dshr-org-2370 125 36 medical medical JJ blog-dshr-org-2370 125 37 equipment equipment NN blog-dshr-org-2370 125 38 , , , blog-dshr-org-2370 125 39 $ $ $ blog-dshr-org-2370 125 40 3.5 3.5 CD blog-dshr-org-2370 125 41 million million CD blog-dshr-org-2370 125 42 for for IN blog-dshr-org-2370 125 43 five five CD blog-dshr-org-2370 125 44 separate separate JJ blog-dshr-org-2370 125 45 data data NN blog-dshr-org-2370 125 46 breaches breach NNS blog-dshr-org-2370 125 47 that that WDT blog-dshr-org-2370 125 48 occurred occur VBD blog-dshr-org-2370 125 49 in in IN blog-dshr-org-2370 125 50 2012 2012 CD blog-dshr-org-2370 125 51 . . . blog-dshr-org-2370 125 52 " " '' blog-dshr-org-2370 126 1 A a DT blog-dshr-org-2370 126 2 derisory derisory JJ blog-dshr-org-2370 126 3 fine fine NN blog-dshr-org-2370 126 4 , , , blog-dshr-org-2370 126 5 6 6 CD blog-dshr-org-2370 126 6 years year NNS blog-dshr-org-2370 126 7 late late RB blog-dshr-org-2370 126 8 , , , blog-dshr-org-2370 126 9 for for IN blog-dshr-org-2370 126 10 losing lose VBG blog-dshr-org-2370 126 11 control control NN blog-dshr-org-2370 126 12 of of IN blog-dshr-org-2370 126 13 physical physical JJ blog-dshr-org-2370 126 14 devices device NNS blog-dshr-org-2370 126 15 containing contain VBG blog-dshr-org-2370 126 16 health health NN blog-dshr-org-2370 126 17 information information NN blog-dshr-org-2370 126 18 . . . blog-dshr-org-2370 127 1 Not not RB blog-dshr-org-2370 127 2 exactly exactly RB blog-dshr-org-2370 127 3 impressive impressive JJ blog-dshr-org-2370 127 4 . . . blog-dshr-org-2370 128 1 July July NNP blog-dshr-org-2370 128 2 16 16 CD blog-dshr-org-2370 128 3 , , , blog-dshr-org-2370 128 4 2021 2021 CD blog-dshr-org-2370 128 5 at at IN blog-dshr-org-2370 128 6 8:58 8:58 CD blog-dshr-org-2370 128 7 AM AM NNP blog-dshr-org-2370 128 8 HMTKSteve hmtksteve NN blog-dshr-org-2370 128 9 said say VBD blog-dshr-org-2370 128 10 ... ... . blog-dshr-org-2370 128 11 How how WRB blog-dshr-org-2370 128 12 about about IN blog-dshr-org-2370 128 13 keeping keep VBG blog-dshr-org-2370 128 14 an an DT blog-dshr-org-2370 128 15 air air NN blog-dshr-org-2370 128 16 gap gap NN blog-dshr-org-2370 128 17 between between IN blog-dshr-org-2370 128 18 critical critical JJ blog-dshr-org-2370 128 19 systems system NNS blog-dshr-org-2370 128 20 and and CC blog-dshr-org-2370 128 21 the the DT blog-dshr-org-2370 128 22 internet internet NN blog-dshr-org-2370 128 23 ? ? . blog-dshr-org-2370 129 1 When when WRB blog-dshr-org-2370 129 2 companies company NNS blog-dshr-org-2370 129 3 used use VBD blog-dshr-org-2370 129 4 dedicated dedicated JJ blog-dshr-org-2370 129 5 data data NN blog-dshr-org-2370 129 6 circuits circuit NNS blog-dshr-org-2370 129 7 this this DT blog-dshr-org-2370 129 8 kind kind NN blog-dshr-org-2370 129 9 of of IN blog-dshr-org-2370 129 10 thing thing NN blog-dshr-org-2370 129 11 did do VBD blog-dshr-org-2370 129 12 not not RB blog-dshr-org-2370 129 13 happen happen VB blog-dshr-org-2370 129 14 . . . blog-dshr-org-2370 130 1 Too too RB blog-dshr-org-2370 130 2 many many JJ blog-dshr-org-2370 130 3 accountants accountant NNS blog-dshr-org-2370 130 4 have have VBP blog-dshr-org-2370 130 5 veto veto NN blog-dshr-org-2370 130 6 powers power NNS blog-dshr-org-2370 130 7 over over IN blog-dshr-org-2370 130 8 IT it NN blog-dshr-org-2370 130 9 and and CC blog-dshr-org-2370 130 10 it -PRON- PRP blog-dshr-org-2370 130 11 shows show VBZ blog-dshr-org-2370 130 12 . . . blog-dshr-org-2370 131 1 July July NNP blog-dshr-org-2370 131 2 16 16 CD blog-dshr-org-2370 131 3 , , , blog-dshr-org-2370 131 4 2021 2021 CD blog-dshr-org-2370 131 5 at at IN blog-dshr-org-2370 131 6 7:25 7:25 CD blog-dshr-org-2370 131 7 PM PM NNP blog-dshr-org-2370 131 8 Static Static NNP blog-dshr-org-2370 131 9 said say VBD blog-dshr-org-2370 131 10 ... ... : blog-dshr-org-2370 132 1 The the DT blog-dshr-org-2370 132 2 government government NN blog-dshr-org-2370 132 3 has have VBZ blog-dshr-org-2370 132 4 no no DT blog-dshr-org-2370 132 5 business business NN blog-dshr-org-2370 132 6 patronizing patronize VBG blog-dshr-org-2370 132 7 anyone anyone NN blog-dshr-org-2370 132 8 to to TO blog-dshr-org-2370 132 9 keep keep VB blog-dshr-org-2370 132 10 their -PRON- PRP$ blog-dshr-org-2370 132 11 IT it PRP blog-dshr-org-2370 132 12 secure secure JJ blog-dshr-org-2370 132 13 anymore anymore RB blog-dshr-org-2370 132 14 than than IN blog-dshr-org-2370 132 15 it -PRON- PRP blog-dshr-org-2370 132 16 has have VBZ blog-dshr-org-2370 132 17 business business NN blog-dshr-org-2370 132 18 telling tell VBG blog-dshr-org-2370 132 19 them -PRON- PRP blog-dshr-org-2370 132 20 to to TO blog-dshr-org-2370 132 21 lock lock VB blog-dshr-org-2370 132 22 their -PRON- PRP$ blog-dshr-org-2370 132 23 front front JJ blog-dshr-org-2370 132 24 door door NN blog-dshr-org-2370 132 25 . . . blog-dshr-org-2370 133 1 July July NNP blog-dshr-org-2370 133 2 17 17 CD blog-dshr-org-2370 133 3 , , , blog-dshr-org-2370 133 4 2021 2021 CD blog-dshr-org-2370 133 5 at at IN blog-dshr-org-2370 133 6 9:32 9:32 CD blog-dshr-org-2370 133 7 AM am NN blog-dshr-org-2370 133 8 David David NNP blog-dshr-org-2370 133 9 . . . blog-dshr-org-2370 134 1 said say VBD blog-dshr-org-2370 134 2 ... ... : blog-dshr-org-2370 134 3 Static static JJ blog-dshr-org-2370 134 4 , , , blog-dshr-org-2370 134 5 tell tell VB blog-dshr-org-2370 134 6 that that DT blog-dshr-org-2370 134 7 to to IN blog-dshr-org-2370 134 8 the the DT blog-dshr-org-2370 134 9 FBI FBI NNP blog-dshr-org-2370 134 10 . . . blog-dshr-org-2370 135 1 Alex Alex NNP blog-dshr-org-2370 135 2 Hern Hern NNP blog-dshr-org-2370 135 3 reported report VBD blog-dshr-org-2370 135 4 April April NNP blog-dshr-org-2370 135 5 14 14 CD blog-dshr-org-2370 135 6 that that IN blog-dshr-org-2370 135 7 FBI FBI NNP blog-dshr-org-2370 135 8 hacks hack NNS blog-dshr-org-2370 135 9 vulnerable vulnerable JJ blog-dshr-org-2370 135 10 US US NNP blog-dshr-org-2370 135 11 computers computer NNS blog-dshr-org-2370 135 12 to to TO blog-dshr-org-2370 135 13 fix fix VB blog-dshr-org-2370 135 14 malicious malicious JJ blog-dshr-org-2370 135 15 malware malware NN blog-dshr-org-2370 135 16 : : : blog-dshr-org-2370 135 17 " " `` blog-dshr-org-2370 135 18 The the DT blog-dshr-org-2370 135 19 FBI FBI NNP blog-dshr-org-2370 135 20 has have VBZ blog-dshr-org-2370 135 21 been be VBN blog-dshr-org-2370 135 22 hacking hack VBG blog-dshr-org-2370 135 23 into into IN blog-dshr-org-2370 135 24 the the DT blog-dshr-org-2370 135 25 computers computer NNS blog-dshr-org-2370 135 26 of of IN blog-dshr-org-2370 135 27 US US NNP blog-dshr-org-2370 135 28 companies company NNS blog-dshr-org-2370 135 29 running run VBG blog-dshr-org-2370 135 30 insecure insecure JJ blog-dshr-org-2370 135 31 versions version NNS blog-dshr-org-2370 135 32 of of IN blog-dshr-org-2370 135 33 Microsoft Microsoft NNP blog-dshr-org-2370 135 34 software software NN blog-dshr-org-2370 135 35 in in IN blog-dshr-org-2370 135 36 order order NN blog-dshr-org-2370 135 37 to to TO blog-dshr-org-2370 135 38 fix fix VB blog-dshr-org-2370 135 39 them -PRON- PRP blog-dshr-org-2370 135 40 , , , blog-dshr-org-2370 135 41 the the DT blog-dshr-org-2370 135 42 US US NNP blog-dshr-org-2370 135 43 Department Department NNP blog-dshr-org-2370 135 44 of of IN blog-dshr-org-2370 135 45 Justice Justice NNP blog-dshr-org-2370 135 46 has have VBZ blog-dshr-org-2370 135 47 announced announce VBN blog-dshr-org-2370 135 48 . . . blog-dshr-org-2370 136 1 The the DT blog-dshr-org-2370 136 2 operation operation NN blog-dshr-org-2370 136 3 , , , blog-dshr-org-2370 136 4 approved approve VBN blog-dshr-org-2370 136 5 by by IN blog-dshr-org-2370 136 6 a a DT blog-dshr-org-2370 136 7 federal federal JJ blog-dshr-org-2370 136 8 court court NN blog-dshr-org-2370 136 9 , , , blog-dshr-org-2370 136 10 involved involve VBD blog-dshr-org-2370 136 11 the the DT blog-dshr-org-2370 136 12 FBI FBI NNP blog-dshr-org-2370 136 13 hacking hacking NN blog-dshr-org-2370 136 14 into into IN blog-dshr-org-2370 136 15 “ " `` blog-dshr-org-2370 136 16 hundreds hundred NNS blog-dshr-org-2370 136 17 ” " '' blog-dshr-org-2370 136 18 of of IN blog-dshr-org-2370 136 19 vulnerable vulnerable JJ blog-dshr-org-2370 136 20 computers computer NNS blog-dshr-org-2370 136 21 to to TO blog-dshr-org-2370 136 22 remove remove VB blog-dshr-org-2370 136 23 malware malware NNP blog-dshr-org-2370 136 24 placed place VBN blog-dshr-org-2370 136 25 there there RB blog-dshr-org-2370 136 26 by by IN blog-dshr-org-2370 136 27 an an DT blog-dshr-org-2370 136 28 earlier early JJR blog-dshr-org-2370 136 29 malicious malicious JJ blog-dshr-org-2370 136 30 hacking hacking NN blog-dshr-org-2370 136 31 campaign campaign NN blog-dshr-org-2370 136 32 , , , blog-dshr-org-2370 136 33 which which WDT blog-dshr-org-2370 136 34 Microsoft Microsoft NNP blog-dshr-org-2370 136 35 blamed blame VBD blog-dshr-org-2370 136 36 on on IN blog-dshr-org-2370 136 37 a a DT blog-dshr-org-2370 136 38 Chinese chinese JJ blog-dshr-org-2370 136 39 hacking hacking NN blog-dshr-org-2370 136 40 group group NN blog-dshr-org-2370 136 41 known know VBN blog-dshr-org-2370 136 42 as as IN blog-dshr-org-2370 136 43 Hafnium Hafnium NNP blog-dshr-org-2370 136 44 . . . blog-dshr-org-2370 136 45 " " '' blog-dshr-org-2370 137 1 July July NNP blog-dshr-org-2370 137 2 19 19 CD blog-dshr-org-2370 137 3 , , , blog-dshr-org-2370 137 4 2021 2021 CD blog-dshr-org-2370 137 5 at at IN blog-dshr-org-2370 137 6 6:56 6:56 CD blog-dshr-org-2370 137 7 AM am NN blog-dshr-org-2370 137 8 David David NNP blog-dshr-org-2370 137 9 . . . blog-dshr-org-2370 138 1 said say VBD blog-dshr-org-2370 138 2 ... ... : blog-dshr-org-2370 139 1 The the DT blog-dshr-org-2370 139 2 Washington Washington NNP blog-dshr-org-2370 139 3 Post Post NNP blog-dshr-org-2370 139 4 's 's POS blog-dshr-org-2370 139 5 Gerrit Gerrit NNP blog-dshr-org-2370 139 6 De De NNP blog-dshr-org-2370 139 7 Vynck Vynck NNP blog-dshr-org-2370 139 8 , , , blog-dshr-org-2370 139 9 Rachel Rachel NNP blog-dshr-org-2370 139 10 Lerman Lerman NNP blog-dshr-org-2370 139 11 , , , blog-dshr-org-2370 139 12 Ellen Ellen NNP blog-dshr-org-2370 139 13 Nakashima Nakashima NNP blog-dshr-org-2370 139 14 and and CC blog-dshr-org-2370 139 15 Chris Chris NNP blog-dshr-org-2370 139 16 Alcantara Alcantara NNP blog-dshr-org-2370 139 17 have have VBP blog-dshr-org-2370 139 18 a a DT blog-dshr-org-2370 139 19 excellent excellent JJ blog-dshr-org-2370 139 20 explainer explainer NN blog-dshr-org-2370 139 21 from from IN blog-dshr-org-2370 139 22 10 10 CD blog-dshr-org-2370 139 23 days day NNS blog-dshr-org-2370 139 24 ago ago RB blog-dshr-org-2370 139 25 entitled entitle VBN blog-dshr-org-2370 139 26 The the DT blog-dshr-org-2370 139 27 anatomy anatomy NN blog-dshr-org-2370 139 28 of of IN blog-dshr-org-2370 139 29 a a DT blog-dshr-org-2370 139 30 ransomware ransomware NN blog-dshr-org-2370 139 31 attack attack NN blog-dshr-org-2370 139 32 . . . blog-dshr-org-2370 140 1 July July NNP blog-dshr-org-2370 140 2 19 19 CD blog-dshr-org-2370 140 3 , , , blog-dshr-org-2370 140 4 2021 2021 CD blog-dshr-org-2370 140 5 at at IN blog-dshr-org-2370 140 6 8:03 8:03 CD blog-dshr-org-2370 140 7 AM am NN blog-dshr-org-2370 140 8 David David NNP blog-dshr-org-2370 140 9 . . . blog-dshr-org-2370 141 1 said say VBD blog-dshr-org-2370 141 2 ... ... : blog-dshr-org-2370 141 3 And and CC blog-dshr-org-2370 141 4 the the DT blog-dshr-org-2370 141 5 class class NN blog-dshr-org-2370 141 6 action action NN blog-dshr-org-2370 141 7 lawyers lawyer NNS blog-dshr-org-2370 141 8 get get VBP blog-dshr-org-2370 141 9 in in RP blog-dshr-org-2370 141 10 on on IN blog-dshr-org-2370 141 11 the the DT blog-dshr-org-2370 141 12 ransomware ransomware NNP blog-dshr-org-2370 141 13 act act NNP blog-dshr-org-2370 141 14 . . . blog-dshr-org-2370 142 1 In in IN blog-dshr-org-2370 142 2 First First NNP blog-dshr-org-2370 142 3 came come VBD blog-dshr-org-2370 142 4 the the DT blog-dshr-org-2370 142 5 ransomware ransomware NN blog-dshr-org-2370 142 6 attacks attack NNS blog-dshr-org-2370 142 7 , , , blog-dshr-org-2370 142 8 now now RB blog-dshr-org-2370 142 9 come come VB blog-dshr-org-2370 142 10 the the DT blog-dshr-org-2370 142 11 lawsuits lawsuit NNS blog-dshr-org-2370 142 12 , , , blog-dshr-org-2370 142 13 Gerrit Gerrit NNP blog-dshr-org-2370 142 14 De De NNP blog-dshr-org-2370 142 15 Vynck Vynck NNP blog-dshr-org-2370 142 16 reports report VBZ blog-dshr-org-2370 142 17 on on IN blog-dshr-org-2370 142 18 Eddie Eddie NNP blog-dshr-org-2370 142 19 Darwich Darwich NNP blog-dshr-org-2370 142 20 , , , blog-dshr-org-2370 142 21 a a DT blog-dshr-org-2370 142 22 pioneering pioneer VBG blog-dshr-org-2370 142 23 plaintiff plaintiff NN blog-dshr-org-2370 142 24 : : : blog-dshr-org-2370 142 25 " " `` blog-dshr-org-2370 142 26 Now now RB blog-dshr-org-2370 142 27 he -PRON- PRP blog-dshr-org-2370 142 28 ’s ’ VBZ blog-dshr-org-2370 142 29 suing sue VBG blog-dshr-org-2370 142 30 Colonial Colonial NNP blog-dshr-org-2370 142 31 Pipeline Pipeline NNP blog-dshr-org-2370 142 32 over over IN blog-dshr-org-2370 142 33 those those DT blog-dshr-org-2370 142 34 lost lose VBN blog-dshr-org-2370 142 35 sales sale NNS blog-dshr-org-2370 142 36 , , , blog-dshr-org-2370 142 37 accusing accuse VBG blog-dshr-org-2370 142 38 it -PRON- PRP blog-dshr-org-2370 142 39 of of IN blog-dshr-org-2370 142 40 lax lax NN blog-dshr-org-2370 142 41 security security NN blog-dshr-org-2370 142 42 . . . blog-dshr-org-2370 143 1 He -PRON- PRP blog-dshr-org-2370 143 2 and and CC blog-dshr-org-2370 143 3 his -PRON- PRP$ blog-dshr-org-2370 143 4 lawyers lawyer NNS blog-dshr-org-2370 143 5 are be VBP blog-dshr-org-2370 143 6 hoping hope VBG blog-dshr-org-2370 143 7 to to TO blog-dshr-org-2370 143 8 also also RB blog-dshr-org-2370 143 9 represent represent VB blog-dshr-org-2370 143 10 the the DT blog-dshr-org-2370 143 11 hundreds hundred NNS blog-dshr-org-2370 143 12 of of IN blog-dshr-org-2370 143 13 other other JJ blog-dshr-org-2370 143 14 small small JJ blog-dshr-org-2370 143 15 gas gas NN blog-dshr-org-2370 143 16 stations station NNS blog-dshr-org-2370 143 17 that that WDT blog-dshr-org-2370 143 18 were be VBD blog-dshr-org-2370 143 19 hurt hurt VBN blog-dshr-org-2370 143 20 by by IN blog-dshr-org-2370 143 21 the the DT blog-dshr-org-2370 143 22 hack hack NN blog-dshr-org-2370 143 23 . . . blog-dshr-org-2370 144 1 It -PRON- PRP blog-dshr-org-2370 144 2 ’s ’ VBZ blog-dshr-org-2370 144 3 just just RB blog-dshr-org-2370 144 4 one one CD blog-dshr-org-2370 144 5 of of IN blog-dshr-org-2370 144 6 several several JJ blog-dshr-org-2370 144 7 class class NN blog-dshr-org-2370 144 8 - - HYPH blog-dshr-org-2370 144 9 action action NN blog-dshr-org-2370 144 10 lawsuits lawsuit NNS blog-dshr-org-2370 144 11 that that WDT blog-dshr-org-2370 144 12 are be VBP blog-dshr-org-2370 144 13 popping pop VBG blog-dshr-org-2370 144 14 up up RP blog-dshr-org-2370 144 15 in in IN blog-dshr-org-2370 144 16 the the DT blog-dshr-org-2370 144 17 wake wake NN blog-dshr-org-2370 144 18 of of IN blog-dshr-org-2370 144 19 high high JJ blog-dshr-org-2370 144 20 - - HYPH blog-dshr-org-2370 144 21 profile profile NN blog-dshr-org-2370 144 22 ransomware ransomware NN blog-dshr-org-2370 144 23 attacks attack NNS blog-dshr-org-2370 144 24 . . . blog-dshr-org-2370 145 1 Another another DT blog-dshr-org-2370 145 2 lawsuit lawsuit NN blog-dshr-org-2370 145 3 filed file VBD blog-dshr-org-2370 145 4 against against IN blog-dshr-org-2370 145 5 Colonial Colonial NNP blog-dshr-org-2370 145 6 in in IN blog-dshr-org-2370 145 7 Georgia Georgia NNP blog-dshr-org-2370 145 8 in in IN blog-dshr-org-2370 145 9 May May NNP blog-dshr-org-2370 145 10 seeks seek VBZ blog-dshr-org-2370 145 11 damages damage NNS blog-dshr-org-2370 145 12 for for IN blog-dshr-org-2370 145 13 consumers consumer NNS blog-dshr-org-2370 145 14 who who WP blog-dshr-org-2370 145 15 had have VBD blog-dshr-org-2370 145 16 to to TO blog-dshr-org-2370 145 17 pay pay VB blog-dshr-org-2370 145 18 higher high JJR blog-dshr-org-2370 145 19 gas gas NN blog-dshr-org-2370 145 20 prices price NNS blog-dshr-org-2370 145 21 . . . blog-dshr-org-2370 146 1 A a DT blog-dshr-org-2370 146 2 third third JJ blog-dshr-org-2370 146 3 is be VBZ blog-dshr-org-2370 146 4 in in IN blog-dshr-org-2370 146 5 the the DT blog-dshr-org-2370 146 6 works work NNS blog-dshr-org-2370 146 7 , , , blog-dshr-org-2370 146 8 with with IN blog-dshr-org-2370 146 9 law law NN blog-dshr-org-2370 146 10 firm firm NN blog-dshr-org-2370 146 11 Chimicles Chimicles NNP blog-dshr-org-2370 146 12 Schwartz Schwartz NNP blog-dshr-org-2370 146 13 Kriner Kriner NNP blog-dshr-org-2370 146 14 & & CC blog-dshr-org-2370 146 15 Donaldson Donaldson NNP blog-dshr-org-2370 146 16 - - HYPH blog-dshr-org-2370 146 17 Smith Smith NNP blog-dshr-org-2370 146 18 LLP LLP NNP blog-dshr-org-2370 146 19 pursuing pursue VBG blog-dshr-org-2370 146 20 a a DT blog-dshr-org-2370 146 21 similar similar JJ blog-dshr-org-2370 146 22 effort effort NN blog-dshr-org-2370 146 23 . . . blog-dshr-org-2370 147 1 And and CC blog-dshr-org-2370 147 2 Colonial Colonial NNP blog-dshr-org-2370 147 3 is be VBZ blog-dshr-org-2370 147 4 n’t not RB blog-dshr-org-2370 147 5 the the DT blog-dshr-org-2370 147 6 only only JJ blog-dshr-org-2370 147 7 company company NN blog-dshr-org-2370 147 8 being be VBG blog-dshr-org-2370 147 9 sued sue VBN blog-dshr-org-2370 147 10 . . . blog-dshr-org-2370 148 1 San San NNP blog-dshr-org-2370 148 2 Diego Diego NNP blog-dshr-org-2370 148 3 - - HYPH blog-dshr-org-2370 148 4 based base VBN blog-dshr-org-2370 148 5 hospital hospital NN blog-dshr-org-2370 148 6 system system NN blog-dshr-org-2370 148 7 Scripps Scripps NNP blog-dshr-org-2370 148 8 Health Health NNP blog-dshr-org-2370 148 9 is be VBZ blog-dshr-org-2370 148 10 facing face VBG blog-dshr-org-2370 148 11 class class NN blog-dshr-org-2370 148 12 - - HYPH blog-dshr-org-2370 148 13 action action NN blog-dshr-org-2370 148 14 lawsuits lawsuit NNS blog-dshr-org-2370 148 15 stemming stem VBG blog-dshr-org-2370 148 16 from from IN blog-dshr-org-2370 148 17 a a DT blog-dshr-org-2370 148 18 ransomware ransomware NN blog-dshr-org-2370 148 19 attack attack NN blog-dshr-org-2370 148 20 in in IN blog-dshr-org-2370 148 21 April April NNP blog-dshr-org-2370 148 22 . . . blog-dshr-org-2370 148 23 " " '' blog-dshr-org-2370 149 1 July July NNP blog-dshr-org-2370 149 2 25 25 CD blog-dshr-org-2370 149 3 , , , blog-dshr-org-2370 149 4 2021 2021 CD blog-dshr-org-2370 149 5 at at IN blog-dshr-org-2370 149 6 1:46 1:46 CD blog-dshr-org-2370 149 7 PM PM NNP blog-dshr-org-2370 149 8 David David NNP blog-dshr-org-2370 149 9 . . . blog-dshr-org-2370 150 1 said say VBD blog-dshr-org-2370 150 2 ... ... : blog-dshr-org-2370 150 3 Charlie Charlie NNP blog-dshr-org-2370 150 4 Osborne Osborne NNP blog-dshr-org-2370 150 5 's 's POS blog-dshr-org-2370 150 6 Updated Updated NNP blog-dshr-org-2370 150 7 Kaseya Kaseya NNP blog-dshr-org-2370 150 8 ransomware ransomware NN blog-dshr-org-2370 150 9 attack attack NN blog-dshr-org-2370 150 10 FAQ FAQ NNP blog-dshr-org-2370 150 11 : : : blog-dshr-org-2370 150 12 What what WP blog-dshr-org-2370 150 13 we -PRON- PRP blog-dshr-org-2370 150 14 know know VBP blog-dshr-org-2370 150 15 now now RB blog-dshr-org-2370 150 16 is be VBZ blog-dshr-org-2370 150 17 a a DT blog-dshr-org-2370 150 18 useful useful JJ blog-dshr-org-2370 150 19 overview overview NN blog-dshr-org-2370 150 20 . . . blog-dshr-org-2370 151 1 July July NNP blog-dshr-org-2370 151 2 27 27 CD blog-dshr-org-2370 151 3 , , , blog-dshr-org-2370 151 4 2021 2021 CD blog-dshr-org-2370 151 5 at at IN blog-dshr-org-2370 151 6 10:07 10:07 CD blog-dshr-org-2370 151 7 AM am NN blog-dshr-org-2370 151 8 David David NNP blog-dshr-org-2370 151 9 . . . blog-dshr-org-2370 152 1 said say VBD blog-dshr-org-2370 152 2 ... ... : blog-dshr-org-2370 153 1 In in IN blog-dshr-org-2370 153 2 the the DT blog-dshr-org-2370 153 3 wake wake NN blog-dshr-org-2370 153 4 of of IN blog-dshr-org-2370 153 5 major major JJ blog-dshr-org-2370 153 6 attacks attack NNS blog-dshr-org-2370 153 7 , , , blog-dshr-org-2370 153 8 ransomware ransomware NN blog-dshr-org-2370 153 9 groups group NNS blog-dshr-org-2370 153 10 Avaddon Avaddon NNP blog-dshr-org-2370 153 11 , , , blog-dshr-org-2370 153 12 DarkSide DarkSide NNP blog-dshr-org-2370 153 13 and and CC blog-dshr-org-2370 153 14 REvil REvil NNP blog-dshr-org-2370 153 15 went go VBD blog-dshr-org-2370 153 16 dark dark JJ blog-dshr-org-2370 153 17 . . . blog-dshr-org-2370 154 1 Now now RB blog-dshr-org-2370 154 2 Dan Dan NNP blog-dshr-org-2370 154 3 Gooding Gooding NNP blog-dshr-org-2370 154 4 reports report VBZ blog-dshr-org-2370 154 5 that that IN blog-dshr-org-2370 154 6 they -PRON- PRP blog-dshr-org-2370 154 7 may may MD blog-dshr-org-2370 154 8 be be VB blog-dshr-org-2370 154 9 re re VBN blog-dshr-org-2370 154 10 - - VBG blog-dshr-org-2370 154 11 branding brand VBG blog-dshr-org-2370 154 12 themselves -PRON- PRP blog-dshr-org-2370 154 13 in in IN blog-dshr-org-2370 154 14 Haron Haron NNP blog-dshr-org-2370 154 15 and and CC blog-dshr-org-2370 154 16 BlackMatter BlackMatter NNP blog-dshr-org-2370 154 17 are be VBP blog-dshr-org-2370 154 18 the the DT blog-dshr-org-2370 154 19 latest late JJS blog-dshr-org-2370 154 20 groups group NNS blog-dshr-org-2370 154 21 to to TO blog-dshr-org-2370 154 22 crash crash VB blog-dshr-org-2370 154 23 the the DT blog-dshr-org-2370 154 24 ransomware ransomware NNP blog-dshr-org-2370 154 25 party party NNP blog-dshr-org-2370 154 26 : : : blog-dshr-org-2370 154 27 " " `` blog-dshr-org-2370 154 28 Both both DT blog-dshr-org-2370 154 29 groups group NNS blog-dshr-org-2370 154 30 say say VBP blog-dshr-org-2370 154 31 they -PRON- PRP blog-dshr-org-2370 154 32 are be VBP blog-dshr-org-2370 154 33 aiming aim VBG blog-dshr-org-2370 154 34 for for IN blog-dshr-org-2370 154 35 big big JJ blog-dshr-org-2370 154 36 - - HYPH blog-dshr-org-2370 154 37 game game NN blog-dshr-org-2370 154 38 targets target NNS blog-dshr-org-2370 154 39 , , , blog-dshr-org-2370 154 40 meaning mean VBG blog-dshr-org-2370 154 41 corporations corporation NNS blog-dshr-org-2370 154 42 or or CC blog-dshr-org-2370 154 43 other other JJ blog-dshr-org-2370 154 44 large large JJ blog-dshr-org-2370 154 45 businesses business NNS blog-dshr-org-2370 154 46 with with IN blog-dshr-org-2370 154 47 the the DT blog-dshr-org-2370 154 48 pockets pocket NNS blog-dshr-org-2370 154 49 to to TO blog-dshr-org-2370 154 50 pay pay VB blog-dshr-org-2370 154 51 ransoms ransom NNS blog-dshr-org-2370 154 52 in in IN blog-dshr-org-2370 154 53 the the DT blog-dshr-org-2370 154 54 millions million NNS blog-dshr-org-2370 154 55 of of IN blog-dshr-org-2370 154 56 dollars dollar NNS blog-dshr-org-2370 154 57 . . . blog-dshr-org-2370 155 1 ... ... : blog-dshr-org-2370 155 2 As as IN blog-dshr-org-2370 155 3 S2W S2W NNP blog-dshr-org-2370 155 4 Lab Lab NNP blog-dshr-org-2370 155 5 pointed point VBD blog-dshr-org-2370 155 6 out out RP blog-dshr-org-2370 155 7 , , , blog-dshr-org-2370 155 8 the the DT blog-dshr-org-2370 155 9 layout layout NN blog-dshr-org-2370 155 10 , , , blog-dshr-org-2370 155 11 organization organization NN blog-dshr-org-2370 155 12 , , , blog-dshr-org-2370 155 13 and and CC blog-dshr-org-2370 155 14 appearance appearance NN blog-dshr-org-2370 155 15 of of IN blog-dshr-org-2370 155 16 [ [ -LRB- blog-dshr-org-2370 155 17 Haron Haron NNP blog-dshr-org-2370 155 18 's 's POS blog-dshr-org-2370 155 19 ] ] -RRB- blog-dshr-org-2370 155 20 site site NN blog-dshr-org-2370 155 21 are be VBP blog-dshr-org-2370 155 22 almost almost RB blog-dshr-org-2370 155 23 identical identical JJ blog-dshr-org-2370 155 24 to to IN blog-dshr-org-2370 155 25 those those DT blog-dshr-org-2370 155 26 for for IN blog-dshr-org-2370 155 27 Avaddon Avaddon NNP blog-dshr-org-2370 155 28 , , , blog-dshr-org-2370 155 29 the the DT blog-dshr-org-2370 155 30 ransomware ransomware NNP blog-dshr-org-2370 155 31 group group NN blog-dshr-org-2370 155 32 that that WDT blog-dshr-org-2370 155 33 went go VBD blog-dshr-org-2370 155 34 dark dark JJ blog-dshr-org-2370 155 35 in in IN blog-dshr-org-2370 155 36 June June NNP blog-dshr-org-2370 155 37 after after IN blog-dshr-org-2370 155 38 sending send VBG blog-dshr-org-2370 155 39 a a DT blog-dshr-org-2370 155 40 master master NN blog-dshr-org-2370 155 41 decryption decryption NN blog-dshr-org-2370 155 42 key key NN blog-dshr-org-2370 155 43 to to IN blog-dshr-org-2370 155 44 BleepingComputer BleepingComputer NNP blog-dshr-org-2370 155 45 that that IN blog-dshr-org-2370 155 46 victims victim NNS blog-dshr-org-2370 155 47 could could MD blog-dshr-org-2370 155 48 use use VB blog-dshr-org-2370 155 49 to to TO blog-dshr-org-2370 155 50 recover recover VB blog-dshr-org-2370 155 51 their -PRON- PRP$ blog-dshr-org-2370 155 52 data datum NNS blog-dshr-org-2370 155 53 . . . blog-dshr-org-2370 156 1 ... ... NFP blog-dshr-org-2370 157 1 Recorded Recorded NNP blog-dshr-org-2370 157 2 Future Future NNP blog-dshr-org-2370 157 3 , , , blog-dshr-org-2370 157 4 The the DT blog-dshr-org-2370 157 5 Record Record NNP blog-dshr-org-2370 157 6 , , , blog-dshr-org-2370 157 7 and and CC blog-dshr-org-2370 157 8 security security NN blog-dshr-org-2370 157 9 firm firm NN blog-dshr-org-2370 157 10 Flashpoint Flashpoint NNP blog-dshr-org-2370 157 11 , , , blog-dshr-org-2370 157 12 which which WDT blog-dshr-org-2370 157 13 also also RB blog-dshr-org-2370 157 14 covered cover VBD blog-dshr-org-2370 157 15 the the DT blog-dshr-org-2370 157 16 emergence emergence NN blog-dshr-org-2370 157 17 of of IN blog-dshr-org-2370 157 18 BlackMatter BlackMatter NNP blog-dshr-org-2370 157 19 , , , blog-dshr-org-2370 157 20 have have VBP blog-dshr-org-2370 157 21 questioned question VBN blog-dshr-org-2370 157 22 if if IN blog-dshr-org-2370 157 23 the the DT blog-dshr-org-2370 157 24 group group NN blog-dshr-org-2370 157 25 has have VBZ blog-dshr-org-2370 157 26 connections connection NNS blog-dshr-org-2370 157 27 to to IN blog-dshr-org-2370 157 28 either either DT blog-dshr-org-2370 157 29 DarkSide DarkSide NNP blog-dshr-org-2370 157 30 or or CC blog-dshr-org-2370 157 31 REvil REvil NNP blog-dshr-org-2370 157 32 . . . blog-dshr-org-2370 157 33 " " '' blog-dshr-org-2370 158 1 July July NNP blog-dshr-org-2370 158 2 28 28 CD blog-dshr-org-2370 158 3 , , , blog-dshr-org-2370 158 4 2021 2021 CD blog-dshr-org-2370 158 5 at at IN blog-dshr-org-2370 158 6 8:55 8:55 CD blog-dshr-org-2370 158 7 AM am VBP blog-dshr-org-2370 158 8 David David NNP blog-dshr-org-2370 158 9 . . . blog-dshr-org-2370 159 1 said say VBD blog-dshr-org-2370 159 2 ... ... : blog-dshr-org-2370 159 3 Just just RB blog-dshr-org-2370 159 4 a a DT blog-dshr-org-2370 159 5 reminder reminder NN blog-dshr-org-2370 159 6 that that IN blog-dshr-org-2370 159 7 the the DT blog-dshr-org-2370 159 8 ransomware ransomware NN blog-dshr-org-2370 159 9 threat threat NN blog-dshr-org-2370 159 10 has have VBZ blog-dshr-org-2370 159 11 been be VBN blog-dshr-org-2370 159 12 being be VBG blog-dshr-org-2370 159 13 ignored ignore VBN blog-dshr-org-2370 159 14 for for IN blog-dshr-org-2370 159 15 a a DT blog-dshr-org-2370 159 16 long long JJ blog-dshr-org-2370 159 17 time time NN blog-dshr-org-2370 159 18 . . . blog-dshr-org-2370 160 1 Nearly nearly RB blog-dshr-org-2370 160 2 five five CD blog-dshr-org-2370 160 3 years year NNS blog-dshr-org-2370 160 4 ago ago RB blog-dshr-org-2370 160 5 I -PRON- PRP blog-dshr-org-2370 160 6 wrote write VBD blog-dshr-org-2370 160 7 Asymmetric Asymmetric NNP blog-dshr-org-2370 160 8 Warfare Warfare NNP blog-dshr-org-2370 160 9 . . . blog-dshr-org-2370 161 1 The the DT blog-dshr-org-2370 161 2 first first JJ blog-dshr-org-2370 161 3 comment comment NN blog-dshr-org-2370 161 4 was be VBD blog-dshr-org-2370 161 5 : : : blog-dshr-org-2370 161 6 " " `` blog-dshr-org-2370 161 7 Ransomware Ransomware NNP blog-dshr-org-2370 161 8 is be VBZ blog-dshr-org-2370 161 9 another another DT blog-dshr-org-2370 161 10 example example NN blog-dshr-org-2370 161 11 . . . blog-dshr-org-2370 162 1 SF SF NNP blog-dshr-org-2370 162 2 Muni Muni NNP blog-dshr-org-2370 162 3 has have VBZ blog-dshr-org-2370 162 4 been be VBN blog-dshr-org-2370 162 5 unable unable JJ blog-dshr-org-2370 162 6 to to TO blog-dshr-org-2370 162 7 collect collect VB blog-dshr-org-2370 162 8 fares fare NNS blog-dshr-org-2370 162 9 for for IN blog-dshr-org-2370 162 10 days day NNS blog-dshr-org-2370 162 11 because because IN blog-dshr-org-2370 162 12 their -PRON- PRP$ blog-dshr-org-2370 162 13 systems system NNS blog-dshr-org-2370 162 14 fell fall VBD blog-dshr-org-2370 162 15 victim victim NN blog-dshr-org-2370 162 16 to to TO blog-dshr-org-2370 162 17 ransomware ransomware VB blog-dshr-org-2370 162 18 . . . blog-dshr-org-2370 163 1 The the DT blog-dshr-org-2370 163 2 costs cost NNS blog-dshr-org-2370 163 3 to to TO blog-dshr-org-2370 163 4 mount mount VB blog-dshr-org-2370 163 5 this this DT blog-dshr-org-2370 163 6 attack attack NN blog-dshr-org-2370 163 7 are be VBP blog-dshr-org-2370 163 8 insignificant insignificant JJ blog-dshr-org-2370 163 9 in in IN blog-dshr-org-2370 163 10 comparison comparison NN blog-dshr-org-2370 163 11 to to IN blog-dshr-org-2370 163 12 the the DT blog-dshr-org-2370 163 13 costs cost NNS blog-dshr-org-2370 163 14 imposed impose VBN blog-dshr-org-2370 163 15 on on IN blog-dshr-org-2370 163 16 the the DT blog-dshr-org-2370 163 17 victim victim NN blog-dshr-org-2370 163 18 . . . blog-dshr-org-2370 164 1 Quinn Quinn NNP blog-dshr-org-2370 164 2 Norton Norton NNP blog-dshr-org-2370 164 3 reports report VBZ blog-dshr-org-2370 164 4 : : : blog-dshr-org-2370 164 5 ' ' `` blog-dshr-org-2370 164 6 The the DT blog-dshr-org-2370 164 7 pre­dic­tions pre­dic­tion NNS blog-dshr-org-2370 164 8 for for IN blog-dshr-org-2370 164 9 this this DT blog-dshr-org-2370 164 10 year year NN blog-dshr-org-2370 164 11 from from IN blog-dshr-org-2370 164 12 some some DT blog-dshr-org-2370 164 13 analy­sis analy­sis CD blog-dshr-org-2370 164 14 is be VBZ blog-dshr-org-2370 164 15 that that IN blog-dshr-org-2370 164 16 we -PRON- PRP blog-dshr-org-2370 164 17 ’ll will MD blog-dshr-org-2370 164 18 hit hit VB blog-dshr-org-2370 164 19 seventy seventy CD blog-dshr-org-2370 164 20 - - HYPH blog-dshr-org-2370 164 21 five five CD blog-dshr-org-2370 164 22 bil­lion bil­lion NN blog-dshr-org-2370 164 23 in in IN blog-dshr-org-2370 164 24 ran­somware ran­somware NN blog-dshr-org-2370 164 25 alone alone RB blog-dshr-org-2370 164 26 by by IN blog-dshr-org-2370 164 27 the the DT blog-dshr-org-2370 164 28 end end NN blog-dshr-org-2370 164 29 of of IN blog-dshr-org-2370 164 30 the the DT blog-dshr-org-2370 164 31 year year NN blog-dshr-org-2370 164 32 . . . blog-dshr-org-2370 165 1 Some some DT blog-dshr-org-2370 165 2 esti­mates esti­mates NNPS blog-dshr-org-2370 165 3 say say VBP blog-dshr-org-2370 165 4 that that IN blog-dshr-org-2370 165 5 the the DT blog-dshr-org-2370 165 6 loss loss NN blog-dshr-org-2370 165 7 glob­al­ly glob­al­ly PRP blog-dshr-org-2370 165 8 could could MD blog-dshr-org-2370 165 9 be be VB blog-dshr-org-2370 165 10 well well RB blog-dshr-org-2370 165 11 over over IN blog-dshr-org-2370 165 12 a a DT blog-dshr-org-2370 165 13 tril­lion tril­lion NNP blog-dshr-org-2370 165 14 this this DT blog-dshr-org-2370 165 15 year year NN blog-dshr-org-2370 165 16 , , , blog-dshr-org-2370 165 17 but but CC blog-dshr-org-2370 165 18 it -PRON- PRP blog-dshr-org-2370 165 19 ’s ’ VBZ blog-dshr-org-2370 165 20 hard hard JJ blog-dshr-org-2370 165 21 to to TO blog-dshr-org-2370 165 22 say say VB blog-dshr-org-2370 165 23 what what WP blog-dshr-org-2370 165 24 a a DT blog-dshr-org-2370 165 25 real real JJ blog-dshr-org-2370 165 26 num­ber num­ber NNP blog-dshr-org-2370 165 27 is be VBZ blog-dshr-org-2370 165 28 . . . blog-dshr-org-2370 165 29 ' ' '' blog-dshr-org-2370 165 30 " " '' blog-dshr-org-2370 166 1 August August NNP blog-dshr-org-2370 166 2 6 6 CD blog-dshr-org-2370 166 3 , , , blog-dshr-org-2370 166 4 2021 2021 CD blog-dshr-org-2370 166 5 at at IN blog-dshr-org-2370 166 6 1:48 1:48 CD blog-dshr-org-2370 166 7 PM PM NNP blog-dshr-org-2370 166 8 David David NNP blog-dshr-org-2370 166 9 . . . blog-dshr-org-2370 167 1 said say VBD blog-dshr-org-2370 167 2 ... ... : blog-dshr-org-2370 167 3 Catalin Catalin NNP blog-dshr-org-2370 167 4 Cimpanu Cimpanu NNP blog-dshr-org-2370 167 5 reports report VBZ blog-dshr-org-2370 167 6 that that IN blog-dshr-org-2370 167 7 Accenture Accenture NNP blog-dshr-org-2370 167 8 downplays downplay VBZ blog-dshr-org-2370 167 9 ransomware ransomware VBP blog-dshr-org-2370 167 10 attack attack NN blog-dshr-org-2370 167 11 as as IN blog-dshr-org-2370 167 12 LockBit LockBit NNP blog-dshr-org-2370 167 13 gang gang NN blog-dshr-org-2370 167 14 leaks leak VBZ blog-dshr-org-2370 167 15 corporate corporate JJ blog-dshr-org-2370 167 16 data datum NNS blog-dshr-org-2370 167 17 : : : blog-dshr-org-2370 167 18 " " `` blog-dshr-org-2370 167 19 Fortune Fortune NNP blog-dshr-org-2370 167 20 500 500 CD blog-dshr-org-2370 167 21 company company NN blog-dshr-org-2370 167 22 Accenture Accenture NNP blog-dshr-org-2370 167 23 has have VBZ blog-dshr-org-2370 167 24 fell fall VBN blog-dshr-org-2370 167 25 victim victim NN blog-dshr-org-2370 167 26 to to IN blog-dshr-org-2370 167 27 a a DT blog-dshr-org-2370 167 28 ransomware ransomware JJ blog-dshr-org-2370 167 29 attack attack NN blog-dshr-org-2370 167 30 but but CC blog-dshr-org-2370 167 31 said say VBD blog-dshr-org-2370 167 32 today today NN blog-dshr-org-2370 167 33 the the DT blog-dshr-org-2370 167 34 incident incident NN blog-dshr-org-2370 167 35 did do VBD blog-dshr-org-2370 167 36 not not RB blog-dshr-org-2370 167 37 impact impact VB blog-dshr-org-2370 167 38 its -PRON- PRP$ blog-dshr-org-2370 167 39 operations operation NNS blog-dshr-org-2370 167 40 and and CC blog-dshr-org-2370 167 41 has have VBZ blog-dshr-org-2370 167 42 already already RB blog-dshr-org-2370 167 43 restored restore VBN blog-dshr-org-2370 167 44 affected affected JJ blog-dshr-org-2370 167 45 systems system NNS blog-dshr-org-2370 167 46 from from IN blog-dshr-org-2370 167 47 backups backup NNS blog-dshr-org-2370 167 48 . . . blog-dshr-org-2370 168 1 News news NN blog-dshr-org-2370 168 2 of of IN blog-dshr-org-2370 168 3 the the DT blog-dshr-org-2370 168 4 attack attack NN blog-dshr-org-2370 168 5 became become VBD blog-dshr-org-2370 168 6 public public JJ blog-dshr-org-2370 168 7 earlier early RBR blog-dshr-org-2370 168 8 this this DT blog-dshr-org-2370 168 9 morning morning NN blog-dshr-org-2370 168 10 when when WRB blog-dshr-org-2370 168 11 the the DT blog-dshr-org-2370 168 12 company company NN blog-dshr-org-2370 168 13 ’s ’s POS blog-dshr-org-2370 168 14 name name NN blog-dshr-org-2370 168 15 was be VBD blog-dshr-org-2370 168 16 listed list VBN blog-dshr-org-2370 168 17 on on IN blog-dshr-org-2370 168 18 the the DT blog-dshr-org-2370 168 19 dark dark JJ blog-dshr-org-2370 168 20 web web NN blog-dshr-org-2370 168 21 blog blog NN blog-dshr-org-2370 168 22 of of IN blog-dshr-org-2370 168 23 the the DT blog-dshr-org-2370 168 24 LockBit LockBit NNP blog-dshr-org-2370 168 25 ransomware ransomware NN blog-dshr-org-2370 168 26 cartel cartel NN blog-dshr-org-2370 168 27 . . . blog-dshr-org-2370 169 1 The the DT blog-dshr-org-2370 169 2 LockBit LockBit NNP blog-dshr-org-2370 169 3 gang gang NN blog-dshr-org-2370 169 4 claimed claim VBD blog-dshr-org-2370 169 5 it -PRON- PRP blog-dshr-org-2370 169 6 gained gain VBD blog-dshr-org-2370 169 7 access access NN blog-dshr-org-2370 169 8 to to IN blog-dshr-org-2370 169 9 the the DT blog-dshr-org-2370 169 10 company company NN blog-dshr-org-2370 169 11 ’s ’s POS blog-dshr-org-2370 169 12 network network NN blog-dshr-org-2370 169 13 and and CC blog-dshr-org-2370 169 14 was be VBD blog-dshr-org-2370 169 15 preparing prepare VBG blog-dshr-org-2370 169 16 to to TO blog-dshr-org-2370 169 17 leak leak VB blog-dshr-org-2370 169 18 files file NNS blog-dshr-org-2370 169 19 stolen steal VBN blog-dshr-org-2370 169 20 from from IN blog-dshr-org-2370 169 21 Accenture Accenture NNP blog-dshr-org-2370 169 22 ’s ’s POS blog-dshr-org-2370 169 23 servers server NNS blog-dshr-org-2370 169 24 at at IN blog-dshr-org-2370 169 25 17:30:00 17:30:00 CD blog-dshr-org-2370 169 26 GMT GMT NNP blog-dshr-org-2370 169 27 . . . blog-dshr-org-2370 170 1 ... ... NFP blog-dshr-org-2370 170 2 Just just RB blog-dshr-org-2370 170 3 before before IN blog-dshr-org-2370 170 4 this this DT blog-dshr-org-2370 170 5 article article NN blog-dshr-org-2370 170 6 was be VBD blog-dshr-org-2370 170 7 published publish VBN blog-dshr-org-2370 170 8 , , , blog-dshr-org-2370 170 9 the the DT blog-dshr-org-2370 170 10 countdown countdown NN blog-dshr-org-2370 170 11 timer timer NN blog-dshr-org-2370 170 12 on on IN blog-dshr-org-2370 170 13 the the DT blog-dshr-org-2370 170 14 LockBit LockBit NNP blog-dshr-org-2370 170 15 gang gang NN blog-dshr-org-2370 170 16 ’s ’s POS blog-dshr-org-2370 170 17 leak leak NN blog-dshr-org-2370 170 18 site site NN blog-dshr-org-2370 170 19 also also RB blog-dshr-org-2370 170 20 reached reach VBD blog-dshr-org-2370 170 21 zero zero CD blog-dshr-org-2370 170 22 . . . blog-dshr-org-2370 171 1 Following follow VBG blog-dshr-org-2370 171 2 this this DT blog-dshr-org-2370 171 3 event event NN blog-dshr-org-2370 171 4 , , , blog-dshr-org-2370 171 5 the the DT blog-dshr-org-2370 171 6 LockBit LockBit NNP blog-dshr-org-2370 171 7 gang gang NN blog-dshr-org-2370 171 8 leaked leak VBD blog-dshr-org-2370 171 9 Accenture Accenture NNP blog-dshr-org-2370 171 10 ’s ’s POS blog-dshr-org-2370 171 11 files file NNS blog-dshr-org-2370 171 12 , , , blog-dshr-org-2370 171 13 which which WDT blog-dshr-org-2370 171 14 , , , blog-dshr-org-2370 171 15 following follow VBG blog-dshr-org-2370 171 16 a a DT blog-dshr-org-2370 171 17 cursory cursory JJ blog-dshr-org-2370 171 18 review review NN blog-dshr-org-2370 171 19 , , , blog-dshr-org-2370 171 20 appeared appear VBD blog-dshr-org-2370 171 21 to to TO blog-dshr-org-2370 171 22 include include VB blog-dshr-org-2370 171 23 brochures brochure NNS blog-dshr-org-2370 171 24 for for IN blog-dshr-org-2370 171 25 Accenture Accenture NNP blog-dshr-org-2370 171 26 products product NNS blog-dshr-org-2370 171 27 , , , blog-dshr-org-2370 171 28 employee employee NN blog-dshr-org-2370 171 29 training training NN blog-dshr-org-2370 171 30 courses course NNS blog-dshr-org-2370 171 31 , , , blog-dshr-org-2370 171 32 and and CC blog-dshr-org-2370 171 33 various various JJ blog-dshr-org-2370 171 34 marketing marketing NN blog-dshr-org-2370 171 35 materials material NNS blog-dshr-org-2370 171 36 . . . blog-dshr-org-2370 172 1 No no DT blog-dshr-org-2370 172 2 sensitive sensitive JJ blog-dshr-org-2370 172 3 information information NN blog-dshr-org-2370 172 4 appeared appear VBD blog-dshr-org-2370 172 5 to to TO blog-dshr-org-2370 172 6 be be VB blog-dshr-org-2370 172 7 included include VBN blog-dshr-org-2370 172 8 in in IN blog-dshr-org-2370 172 9 the the DT blog-dshr-org-2370 172 10 leaked leak VBN blog-dshr-org-2370 172 11 files file NNS blog-dshr-org-2370 172 12 . . . blog-dshr-org-2370 172 13 " " '' blog-dshr-org-2370 173 1 August August NNP blog-dshr-org-2370 173 2 12 12 CD blog-dshr-org-2370 173 3 , , , blog-dshr-org-2370 173 4 2021 2021 CD blog-dshr-org-2370 173 5 at at IN blog-dshr-org-2370 173 6 4:01 4:01 CD blog-dshr-org-2370 173 7 PM pm NN blog-dshr-org-2370 173 8 Post Post NNP blog-dshr-org-2370 173 9 a a DT blog-dshr-org-2370 173 10 Comment Comment NNP blog-dshr-org-2370 173 11 Newer Newer NNP blog-dshr-org-2370 173 12 Post Post NNP blog-dshr-org-2370 173 13 Older Older NNP blog-dshr-org-2370 173 14 Post Post NNP blog-dshr-org-2370 173 15 Home Home NNP blog-dshr-org-2370 173 16 Subscribe Subscribe NNP blog-dshr-org-2370 173 17 to to TO blog-dshr-org-2370 173 18 : : : blog-dshr-org-2370 173 19 Post Post NNP blog-dshr-org-2370 173 20 Comments comment NNS blog-dshr-org-2370 173 21 ( ( -LRB- blog-dshr-org-2370 173 22 Atom atom NN blog-dshr-org-2370 173 23 ) ) -RRB- blog-dshr-org-2370 173 24 Blog Blog NNP blog-dshr-org-2370 173 25 Rules rule NNS blog-dshr-org-2370 173 26 Posts post NNS blog-dshr-org-2370 173 27 and and CC blog-dshr-org-2370 173 28 comments comment NNS blog-dshr-org-2370 173 29 are be VBP blog-dshr-org-2370 173 30 copyright copyright NN blog-dshr-org-2370 173 31 of of IN blog-dshr-org-2370 173 32 their -PRON- PRP$ blog-dshr-org-2370 173 33 respective respective JJ blog-dshr-org-2370 173 34 authors author NNS blog-dshr-org-2370 173 35 who who WP blog-dshr-org-2370 173 36 , , , blog-dshr-org-2370 173 37 by by IN blog-dshr-org-2370 173 38 posting post VBG blog-dshr-org-2370 173 39 or or CC blog-dshr-org-2370 173 40 commenting comment VBG blog-dshr-org-2370 173 41 , , , blog-dshr-org-2370 173 42 license license VBP blog-dshr-org-2370 173 43 their -PRON- PRP$ blog-dshr-org-2370 173 44 work work NN blog-dshr-org-2370 173 45 under under IN blog-dshr-org-2370 173 46 a a DT blog-dshr-org-2370 173 47 Creative Creative NNP blog-dshr-org-2370 173 48 Commons Commons NNP blog-dshr-org-2370 173 49 Attribution Attribution NNP blog-dshr-org-2370 173 50 - - HYPH blog-dshr-org-2370 173 51 Share Share NNP blog-dshr-org-2370 173 52 Alike alike RB blog-dshr-org-2370 173 53 3.0 3.0 CD blog-dshr-org-2370 173 54 United United NNP blog-dshr-org-2370 173 55 States States NNP blog-dshr-org-2370 173 56 License License NNP blog-dshr-org-2370 173 57 . . . blog-dshr-org-2370 174 1 Off off IN blog-dshr-org-2370 174 2 - - HYPH blog-dshr-org-2370 174 3 topic topic NN blog-dshr-org-2370 174 4 or or CC blog-dshr-org-2370 174 5 unsuitable unsuitable JJ blog-dshr-org-2370 174 6 comments comment NNS blog-dshr-org-2370 174 7 will will MD blog-dshr-org-2370 174 8 be be VB blog-dshr-org-2370 174 9 deleted delete VBN blog-dshr-org-2370 174 10 . . . blog-dshr-org-2370 175 1 DSHR DSHR NNP blog-dshr-org-2370 175 2 DSHR DSHR NNP blog-dshr-org-2370 175 3 in in IN blog-dshr-org-2370 175 4 ANWR ANWR NNP blog-dshr-org-2370 175 5 Recent recent JJ blog-dshr-org-2370 175 6 Comments comment NNS blog-dshr-org-2370 175 7 Full full JJ blog-dshr-org-2370 175 8 comments comment NNS blog-dshr-org-2370 175 9 Blog Blog NNP blog-dshr-org-2370 175 10 Archive Archive NNP blog-dshr-org-2370 175 11 ▼ ▼ NNP blog-dshr-org-2370 175 12     _SP blog-dshr-org-2370 175 13 2021 2021 CD blog-dshr-org-2370 175 14 ( ( -LRB- blog-dshr-org-2370 175 15 39 39 CD blog-dshr-org-2370 175 16 ) ) -RRB- blog-dshr-org-2370 175 17 ► ► NFP blog-dshr-org-2370 175 18     _SP blog-dshr-org-2370 175 19 August August NNP blog-dshr-org-2370 175 20 ( ( -LRB- blog-dshr-org-2370 175 21 2 2 LS blog-dshr-org-2370 175 22 ) ) -RRB- blog-dshr-org-2370 175 23 ▼ ▼ CD blog-dshr-org-2370 175 24     _SP blog-dshr-org-2370 175 25 July July NNP blog-dshr-org-2370 175 26 ( ( -LRB- blog-dshr-org-2370 175 27 6 6 CD blog-dshr-org-2370 175 28 ) ) -RRB- blog-dshr-org-2370 175 29 Economics Economics NNP blog-dshr-org-2370 175 30 Of of IN blog-dshr-org-2370 175 31 Evil Evil NNP blog-dshr-org-2370 175 32 Revisited Revisited NNP blog-dshr-org-2370 175 33 Yet Yet NNP blog-dshr-org-2370 175 34 Another Another NNP blog-dshr-org-2370 175 35 DNA DNA NNP blog-dshr-org-2370 175 36 Storage storage NN blog-dshr-org-2370 175 37 Technique technique NN blog-dshr-org-2370 175 38 Alternatives Alternatives NNP blog-dshr-org-2370 175 39 To to IN blog-dshr-org-2370 175 40 Proof proof NN blog-dshr-org-2370 175 41 - - HYPH blog-dshr-org-2370 175 42 of of IN blog-dshr-org-2370 175 43 - - HYPH blog-dshr-org-2370 175 44 Work work NN blog-dshr-org-2370 175 45 A a DT blog-dshr-org-2370 175 46 Modest modest JJ blog-dshr-org-2370 175 47 Proposal proposal NN blog-dshr-org-2370 175 48 About about IN blog-dshr-org-2370 175 49 Ransomware Ransomware NNP blog-dshr-org-2370 175 50 Intel Intel NNP blog-dshr-org-2370 175 51 Did do VBD blog-dshr-org-2370 175 52 A a DT blog-dshr-org-2370 175 53 Boeing Boeing NNP blog-dshr-org-2370 175 54 Graphing graph VBG blog-dshr-org-2370 175 55 China China NNP blog-dshr-org-2370 175 56 's 's POS blog-dshr-org-2370 175 57 Cryptocurrency Cryptocurrency NNP blog-dshr-org-2370 175 58 Crackdown Crackdown NNP blog-dshr-org-2370 175 59 ► ► NNP blog-dshr-org-2370 175 60     _SP blog-dshr-org-2370 175 61 June June NNP blog-dshr-org-2370 175 62 ( ( -LRB- blog-dshr-org-2370 175 63 8) 8) CD blog-dshr-org-2370 175 64 ► ► CD blog-dshr-org-2370 175 65     _SP blog-dshr-org-2370 175 66 May May NNP blog-dshr-org-2370 175 67 ( ( -LRB- blog-dshr-org-2370 175 68 4 4 CD blog-dshr-org-2370 175 69 ) ) -RRB- blog-dshr-org-2370 175 70 ► ► NFP blog-dshr-org-2370 175 71     _SP blog-dshr-org-2370 175 72 April April NNP blog-dshr-org-2370 175 73 ( ( -LRB- blog-dshr-org-2370 175 74 6 6 CD blog-dshr-org-2370 175 75 ) ) -RRB- blog-dshr-org-2370 175 76 ► ► NFP blog-dshr-org-2370 175 77     _SP blog-dshr-org-2370 175 78 March March NNP blog-dshr-org-2370 175 79 ( ( -LRB- blog-dshr-org-2370 175 80 3 3 CD blog-dshr-org-2370 175 81 ) ) -RRB- blog-dshr-org-2370 175 82 ► ► NFP blog-dshr-org-2370 175 83     _SP blog-dshr-org-2370 175 84 February February NNP blog-dshr-org-2370 175 85 ( ( -LRB- blog-dshr-org-2370 175 86 5 5 CD blog-dshr-org-2370 175 87 ) ) -RRB- blog-dshr-org-2370 175 88 ► ► NFP blog-dshr-org-2370 175 89     _SP blog-dshr-org-2370 175 90 January January NNP blog-dshr-org-2370 175 91 ( ( -LRB- blog-dshr-org-2370 175 92 5 5 CD blog-dshr-org-2370 175 93 ) ) -RRB- blog-dshr-org-2370 175 94 ► ► CD blog-dshr-org-2370 175 95     _SP blog-dshr-org-2370 175 96 2020 2020 CD blog-dshr-org-2370 175 97 ( ( -LRB- blog-dshr-org-2370 175 98 55 55 CD blog-dshr-org-2370 175 99 ) ) -RRB- blog-dshr-org-2370 175 100 ► ► NFP blog-dshr-org-2370 175 101     _SP blog-dshr-org-2370 175 102 December December NNP blog-dshr-org-2370 175 103 ( ( -LRB- blog-dshr-org-2370 175 104 4 4 CD blog-dshr-org-2370 175 105 ) ) -RRB- blog-dshr-org-2370 175 106 ► ► NFP blog-dshr-org-2370 175 107     _SP blog-dshr-org-2370 175 108 November November NNP blog-dshr-org-2370 175 109 ( ( -LRB- blog-dshr-org-2370 175 110 4 4 CD blog-dshr-org-2370 175 111 ) ) -RRB- blog-dshr-org-2370 175 112 ► ► NFP blog-dshr-org-2370 175 113     _SP blog-dshr-org-2370 175 114 October October NNP blog-dshr-org-2370 175 115 ( ( -LRB- blog-dshr-org-2370 175 116 3 3 CD blog-dshr-org-2370 175 117 ) ) -RRB- blog-dshr-org-2370 175 118 ► ► NFP blog-dshr-org-2370 175 119     _SP blog-dshr-org-2370 175 120 September September NNP blog-dshr-org-2370 175 121 ( ( -LRB- blog-dshr-org-2370 175 122 6 6 CD blog-dshr-org-2370 175 123 ) ) -RRB- blog-dshr-org-2370 175 124 ► ► NFP blog-dshr-org-2370 175 125     _SP blog-dshr-org-2370 175 126 August August NNP blog-dshr-org-2370 175 127 ( ( -LRB- blog-dshr-org-2370 175 128 5 5 CD blog-dshr-org-2370 175 129 ) ) -RRB- blog-dshr-org-2370 175 130 ► ► NFP blog-dshr-org-2370 175 131     _SP blog-dshr-org-2370 175 132 July July NNP blog-dshr-org-2370 175 133 ( ( -LRB- blog-dshr-org-2370 175 134 3 3 CD blog-dshr-org-2370 175 135 ) ) -RRB- blog-dshr-org-2370 175 136 ► ► NFP blog-dshr-org-2370 175 137     _SP blog-dshr-org-2370 175 138 June June NNP blog-dshr-org-2370 175 139 ( ( -LRB- blog-dshr-org-2370 175 140 6 6 CD blog-dshr-org-2370 175 141 ) ) -RRB- blog-dshr-org-2370 175 142 ► ► NFP blog-dshr-org-2370 175 143     _SP blog-dshr-org-2370 175 144 May May NNP blog-dshr-org-2370 175 145 ( ( -LRB- blog-dshr-org-2370 175 146 3 3 CD blog-dshr-org-2370 175 147 ) ) -RRB- blog-dshr-org-2370 175 148 ► ► NFP blog-dshr-org-2370 175 149     _SP blog-dshr-org-2370 175 150 April April NNP blog-dshr-org-2370 175 151 ( ( -LRB- blog-dshr-org-2370 175 152 5 5 CD blog-dshr-org-2370 175 153 ) ) -RRB- blog-dshr-org-2370 175 154 ► ► NFP blog-dshr-org-2370 175 155     _SP blog-dshr-org-2370 175 156 March March NNP blog-dshr-org-2370 175 157 ( ( -LRB- blog-dshr-org-2370 175 158 6 6 CD blog-dshr-org-2370 175 159 ) ) -RRB- blog-dshr-org-2370 175 160 ► ► NFP blog-dshr-org-2370 175 161     _SP blog-dshr-org-2370 175 162 February February NNP blog-dshr-org-2370 175 163 ( ( -LRB- blog-dshr-org-2370 175 164 5 5 CD blog-dshr-org-2370 175 165 ) ) -RRB- blog-dshr-org-2370 175 166 ► ► NFP blog-dshr-org-2370 175 167     _SP blog-dshr-org-2370 175 168 January January NNP blog-dshr-org-2370 175 169 ( ( -LRB- blog-dshr-org-2370 175 170 5 5 CD blog-dshr-org-2370 175 171 ) ) -RRB- blog-dshr-org-2370 175 172 ► ► CD blog-dshr-org-2370 175 173     _SP blog-dshr-org-2370 175 174 2019 2019 CD blog-dshr-org-2370 175 175 ( ( -LRB- blog-dshr-org-2370 175 176 66 66 CD blog-dshr-org-2370 175 177 ) ) -RRB- blog-dshr-org-2370 175 178 ► ► NFP blog-dshr-org-2370 175 179     _SP blog-dshr-org-2370 175 180 December December NNP blog-dshr-org-2370 175 181 ( ( -LRB- blog-dshr-org-2370 175 182 2 2 CD blog-dshr-org-2370 175 183 ) ) -RRB- blog-dshr-org-2370 175 184 ► ► NFP blog-dshr-org-2370 175 185     _SP blog-dshr-org-2370 175 186 November November NNP blog-dshr-org-2370 175 187 ( ( -LRB- blog-dshr-org-2370 175 188 4 4 CD blog-dshr-org-2370 175 189 ) ) -RRB- blog-dshr-org-2370 175 190 ► ► NFP blog-dshr-org-2370 175 191     _SP blog-dshr-org-2370 175 192 October October NNP blog-dshr-org-2370 175 193 ( ( -LRB- blog-dshr-org-2370 175 194 8) 8) CD blog-dshr-org-2370 175 195 ► ► CD blog-dshr-org-2370 175 196     _SP blog-dshr-org-2370 175 197 September September NNP blog-dshr-org-2370 175 198 ( ( -LRB- blog-dshr-org-2370 175 199 5 5 CD blog-dshr-org-2370 175 200 ) ) -RRB- blog-dshr-org-2370 175 201 ► ► NFP blog-dshr-org-2370 175 202     _SP blog-dshr-org-2370 175 203 August August NNP blog-dshr-org-2370 175 204 ( ( -LRB- blog-dshr-org-2370 175 205 5 5 CD blog-dshr-org-2370 175 206 ) ) -RRB- blog-dshr-org-2370 175 207 ► ► NFP blog-dshr-org-2370 175 208     _SP blog-dshr-org-2370 175 209 July July NNP blog-dshr-org-2370 175 210 ( ( -LRB- blog-dshr-org-2370 175 211 7 7 CD blog-dshr-org-2370 175 212 ) ) -RRB- blog-dshr-org-2370 175 213 ► ► NFP blog-dshr-org-2370 175 214     _SP blog-dshr-org-2370 175 215 June June NNP blog-dshr-org-2370 175 216 ( ( -LRB- blog-dshr-org-2370 175 217 6 6 CD blog-dshr-org-2370 175 218 ) ) -RRB- blog-dshr-org-2370 175 219 ► ► NFP blog-dshr-org-2370 175 220     _SP blog-dshr-org-2370 175 221 May May NNP blog-dshr-org-2370 175 222 ( ( -LRB- blog-dshr-org-2370 175 223 7 7 CD blog-dshr-org-2370 175 224 ) ) -RRB- blog-dshr-org-2370 175 225 ► ► NFP blog-dshr-org-2370 175 226     _SP blog-dshr-org-2370 175 227 April April NNP blog-dshr-org-2370 175 228 ( ( -LRB- blog-dshr-org-2370 175 229 6 6 CD blog-dshr-org-2370 175 230 ) ) -RRB- blog-dshr-org-2370 175 231 ► ► NFP blog-dshr-org-2370 175 232     _SP blog-dshr-org-2370 175 233 March March NNP blog-dshr-org-2370 175 234 ( ( -LRB- blog-dshr-org-2370 175 235 7 7 CD blog-dshr-org-2370 175 236 ) ) -RRB- blog-dshr-org-2370 175 237 ► ► NFP blog-dshr-org-2370 175 238     _SP blog-dshr-org-2370 175 239 February February NNP blog-dshr-org-2370 175 240 ( ( -LRB- blog-dshr-org-2370 175 241 4 4 CD blog-dshr-org-2370 175 242 ) ) -RRB- blog-dshr-org-2370 175 243 ► ► NFP blog-dshr-org-2370 175 244     _SP blog-dshr-org-2370 175 245 January January NNP blog-dshr-org-2370 175 246 ( ( -LRB- blog-dshr-org-2370 175 247 5 5 CD blog-dshr-org-2370 175 248 ) ) -RRB- blog-dshr-org-2370 175 249 ► ► CD blog-dshr-org-2370 175 250     _SP blog-dshr-org-2370 175 251 2018 2018 CD blog-dshr-org-2370 175 252 ( ( -LRB- blog-dshr-org-2370 175 253 96 96 CD blog-dshr-org-2370 175 254 ) ) -RRB- blog-dshr-org-2370 175 255 ► ► NFP blog-dshr-org-2370 175 256     _SP blog-dshr-org-2370 175 257 December December NNP blog-dshr-org-2370 175 258 ( ( -LRB- blog-dshr-org-2370 175 259 7 7 CD blog-dshr-org-2370 175 260 ) ) -RRB- blog-dshr-org-2370 175 261 ► ► NFP blog-dshr-org-2370 175 262     _SP blog-dshr-org-2370 175 263 November November NNP blog-dshr-org-2370 175 264 ( ( -LRB- blog-dshr-org-2370 175 265 8) 8) CD blog-dshr-org-2370 175 266 ► ► CD blog-dshr-org-2370 175 267     _SP blog-dshr-org-2370 175 268 October October NNP blog-dshr-org-2370 175 269 ( ( -LRB- blog-dshr-org-2370 175 270 10 10 CD blog-dshr-org-2370 175 271 ) ) -RRB- blog-dshr-org-2370 175 272 ► ► NFP blog-dshr-org-2370 175 273     _SP blog-dshr-org-2370 175 274 September September NNP blog-dshr-org-2370 175 275 ( ( -LRB- blog-dshr-org-2370 175 276 5 5 CD blog-dshr-org-2370 175 277 ) ) -RRB- blog-dshr-org-2370 175 278 ► ► NFP blog-dshr-org-2370 175 279     _SP blog-dshr-org-2370 175 280 August August NNP blog-dshr-org-2370 175 281 ( ( -LRB- blog-dshr-org-2370 175 282 8) 8) CD blog-dshr-org-2370 175 283 ► ► CD blog-dshr-org-2370 175 284     _SP blog-dshr-org-2370 175 285 July July NNP blog-dshr-org-2370 175 286 ( ( -LRB- blog-dshr-org-2370 175 287 5 5 CD blog-dshr-org-2370 175 288 ) ) -RRB- blog-dshr-org-2370 175 289 ► ► NFP blog-dshr-org-2370 175 290     _SP blog-dshr-org-2370 175 291 June June NNP blog-dshr-org-2370 175 292 ( ( -LRB- blog-dshr-org-2370 175 293 7 7 CD blog-dshr-org-2370 175 294 ) ) -RRB- blog-dshr-org-2370 175 295 ► ► NFP blog-dshr-org-2370 175 296     _SP blog-dshr-org-2370 175 297 May May NNP blog-dshr-org-2370 175 298 ( ( -LRB- blog-dshr-org-2370 175 299 10 10 CD blog-dshr-org-2370 175 300 ) ) -RRB- blog-dshr-org-2370 175 301 ► ► NFP blog-dshr-org-2370 175 302     _SP blog-dshr-org-2370 175 303 April April NNP blog-dshr-org-2370 175 304 ( ( -LRB- blog-dshr-org-2370 175 305 8) 8) CD blog-dshr-org-2370 175 306 ► ► CD blog-dshr-org-2370 175 307     _SP blog-dshr-org-2370 175 308 March March NNP blog-dshr-org-2370 175 309 ( ( -LRB- blog-dshr-org-2370 175 310 9 9 CD blog-dshr-org-2370 175 311 ) ) -RRB- blog-dshr-org-2370 175 312 ► ► NFP blog-dshr-org-2370 175 313     _SP blog-dshr-org-2370 175 314 February February NNP blog-dshr-org-2370 175 315 ( ( -LRB- blog-dshr-org-2370 175 316 9 9 CD blog-dshr-org-2370 175 317 ) ) -RRB- blog-dshr-org-2370 175 318 ► ► NFP blog-dshr-org-2370 175 319     _SP blog-dshr-org-2370 175 320 January January NNP blog-dshr-org-2370 175 321 ( ( -LRB- blog-dshr-org-2370 175 322 10 10 CD blog-dshr-org-2370 175 323 ) ) -RRB- blog-dshr-org-2370 175 324 ► ► NFP blog-dshr-org-2370 175 325     _SP blog-dshr-org-2370 175 326 2017 2017 CD blog-dshr-org-2370 175 327 ( ( -LRB- blog-dshr-org-2370 175 328 82 82 CD blog-dshr-org-2370 175 329 ) ) -RRB- blog-dshr-org-2370 175 330 ► ► NFP blog-dshr-org-2370 175 331     _SP blog-dshr-org-2370 175 332 December December NNP blog-dshr-org-2370 175 333 ( ( -LRB- blog-dshr-org-2370 175 334 6 6 CD blog-dshr-org-2370 175 335 ) ) -RRB- blog-dshr-org-2370 175 336 ► ► NFP blog-dshr-org-2370 175 337     _SP blog-dshr-org-2370 175 338 November November NNP blog-dshr-org-2370 175 339 ( ( -LRB- blog-dshr-org-2370 175 340 6 6 CD blog-dshr-org-2370 175 341 ) ) -RRB- blog-dshr-org-2370 175 342 ► ► NFP blog-dshr-org-2370 175 343     _SP blog-dshr-org-2370 175 344 October October NNP blog-dshr-org-2370 175 345 ( ( -LRB- blog-dshr-org-2370 175 346 8) 8) CD blog-dshr-org-2370 175 347 ► ► CD blog-dshr-org-2370 175 348     _SP blog-dshr-org-2370 175 349 September September NNP blog-dshr-org-2370 175 350 ( ( -LRB- blog-dshr-org-2370 175 351 6 6 CD blog-dshr-org-2370 175 352 ) ) -RRB- blog-dshr-org-2370 175 353 ► ► NFP blog-dshr-org-2370 175 354     _SP blog-dshr-org-2370 175 355 August August NNP blog-dshr-org-2370 175 356 ( ( -LRB- blog-dshr-org-2370 175 357 7 7 CD blog-dshr-org-2370 175 358 ) ) -RRB- blog-dshr-org-2370 175 359 ► ► NFP blog-dshr-org-2370 175 360     _SP blog-dshr-org-2370 175 361 July July NNP blog-dshr-org-2370 175 362 ( ( -LRB- blog-dshr-org-2370 175 363 5 5 CD blog-dshr-org-2370 175 364 ) ) -RRB- blog-dshr-org-2370 175 365 ► ► NFP blog-dshr-org-2370 175 366     _SP blog-dshr-org-2370 175 367 June June NNP blog-dshr-org-2370 175 368 ( ( -LRB- blog-dshr-org-2370 175 369 7 7 CD blog-dshr-org-2370 175 370 ) ) -RRB- blog-dshr-org-2370 175 371 ► ► NFP blog-dshr-org-2370 175 372     _SP blog-dshr-org-2370 175 373 May May NNP blog-dshr-org-2370 175 374 ( ( -LRB- blog-dshr-org-2370 175 375 6 6 CD blog-dshr-org-2370 175 376 ) ) -RRB- blog-dshr-org-2370 175 377 ► ► NFP blog-dshr-org-2370 175 378     _SP blog-dshr-org-2370 175 379 April April NNP blog-dshr-org-2370 175 380 ( ( -LRB- blog-dshr-org-2370 175 381 7 7 CD blog-dshr-org-2370 175 382 ) ) -RRB- blog-dshr-org-2370 175 383 ► ► NFP blog-dshr-org-2370 175 384     _SP blog-dshr-org-2370 175 385 March March NNP blog-dshr-org-2370 175 386 ( ( -LRB- blog-dshr-org-2370 175 387 11 11 CD blog-dshr-org-2370 175 388 ) ) -RRB- blog-dshr-org-2370 175 389 ► ► NFP blog-dshr-org-2370 175 390     _SP blog-dshr-org-2370 175 391 February February NNP blog-dshr-org-2370 175 392 ( ( -LRB- blog-dshr-org-2370 175 393 5 5 CD blog-dshr-org-2370 175 394 ) ) -RRB- blog-dshr-org-2370 175 395 ► ► NFP blog-dshr-org-2370 175 396     _SP blog-dshr-org-2370 175 397 January January NNP blog-dshr-org-2370 175 398 ( ( -LRB- blog-dshr-org-2370 175 399 8) 8) CD blog-dshr-org-2370 175 400 ► ► CD blog-dshr-org-2370 175 401     _SP blog-dshr-org-2370 175 402 2016 2016 CD blog-dshr-org-2370 175 403 ( ( -LRB- blog-dshr-org-2370 175 404 89 89 CD blog-dshr-org-2370 175 405 ) ) -RRB- blog-dshr-org-2370 175 406 ► ► NFP blog-dshr-org-2370 175 407     _SP blog-dshr-org-2370 175 408 December December NNP blog-dshr-org-2370 175 409 ( ( -LRB- blog-dshr-org-2370 175 410 4 4 CD blog-dshr-org-2370 175 411 ) ) -RRB- blog-dshr-org-2370 175 412 ► ► NFP blog-dshr-org-2370 175 413     _SP blog-dshr-org-2370 175 414 November November NNP blog-dshr-org-2370 175 415 ( ( -LRB- blog-dshr-org-2370 175 416 8) 8) CD blog-dshr-org-2370 175 417 ► ► CD blog-dshr-org-2370 175 418     _SP blog-dshr-org-2370 175 419 October October NNP blog-dshr-org-2370 175 420 ( ( -LRB- blog-dshr-org-2370 175 421 10 10 CD blog-dshr-org-2370 175 422 ) ) -RRB- blog-dshr-org-2370 175 423 ► ► NFP blog-dshr-org-2370 175 424     _SP blog-dshr-org-2370 175 425 September September NNP blog-dshr-org-2370 175 426 ( ( -LRB- blog-dshr-org-2370 175 427 8) 8) CD blog-dshr-org-2370 175 428 ► ► CD blog-dshr-org-2370 175 429     _SP blog-dshr-org-2370 175 430 August August NNP blog-dshr-org-2370 175 431 ( ( -LRB- blog-dshr-org-2370 175 432 8) 8) CD blog-dshr-org-2370 175 433 ► ► CD blog-dshr-org-2370 175 434     _SP blog-dshr-org-2370 175 435 July July NNP blog-dshr-org-2370 175 436 ( ( -LRB- blog-dshr-org-2370 175 437 7 7 CD blog-dshr-org-2370 175 438 ) ) -RRB- blog-dshr-org-2370 175 439 ► ► NFP blog-dshr-org-2370 175 440     _SP blog-dshr-org-2370 175 441 June June NNP blog-dshr-org-2370 175 442 ( ( -LRB- blog-dshr-org-2370 175 443 8) 8) CD blog-dshr-org-2370 175 444 ► ► CD blog-dshr-org-2370 175 445     _SP blog-dshr-org-2370 175 446 May May NNP blog-dshr-org-2370 175 447 ( ( -LRB- blog-dshr-org-2370 175 448 7 7 CD blog-dshr-org-2370 175 449 ) ) -RRB- blog-dshr-org-2370 175 450 ► ► NFP blog-dshr-org-2370 175 451     _SP blog-dshr-org-2370 175 452 April April NNP blog-dshr-org-2370 175 453 ( ( -LRB- blog-dshr-org-2370 175 454 5 5 CD blog-dshr-org-2370 175 455 ) ) -RRB- blog-dshr-org-2370 175 456 ► ► NFP blog-dshr-org-2370 175 457     _SP blog-dshr-org-2370 175 458 March March NNP blog-dshr-org-2370 175 459 ( ( -LRB- blog-dshr-org-2370 175 460 10 10 CD blog-dshr-org-2370 175 461 ) ) -RRB- blog-dshr-org-2370 175 462 ► ► NFP blog-dshr-org-2370 175 463     _SP blog-dshr-org-2370 175 464 February February NNP blog-dshr-org-2370 175 465 ( ( -LRB- blog-dshr-org-2370 175 466 7 7 CD blog-dshr-org-2370 175 467 ) ) -RRB- blog-dshr-org-2370 175 468 ► ► NFP blog-dshr-org-2370 175 469     _SP blog-dshr-org-2370 175 470 January January NNP blog-dshr-org-2370 175 471 ( ( -LRB- blog-dshr-org-2370 175 472 7 7 CD blog-dshr-org-2370 175 473 ) ) -RRB- blog-dshr-org-2370 175 474 ► ► NFP blog-dshr-org-2370 175 475     _SP blog-dshr-org-2370 175 476 2015 2015 CD blog-dshr-org-2370 175 477 ( ( -LRB- blog-dshr-org-2370 175 478 75 75 CD blog-dshr-org-2370 175 479 ) ) -RRB- blog-dshr-org-2370 175 480 ► ► NFP blog-dshr-org-2370 175 481     _SP blog-dshr-org-2370 175 482 December December NNP blog-dshr-org-2370 175 483 ( ( -LRB- blog-dshr-org-2370 175 484 7 7 CD blog-dshr-org-2370 175 485 ) ) -RRB- blog-dshr-org-2370 175 486 ► ► NFP blog-dshr-org-2370 175 487     _SP blog-dshr-org-2370 175 488 November November NNP blog-dshr-org-2370 175 489 ( ( -LRB- blog-dshr-org-2370 175 490 5 5 CD blog-dshr-org-2370 175 491 ) ) -RRB- blog-dshr-org-2370 175 492 ► ► NFP blog-dshr-org-2370 175 493     _SP blog-dshr-org-2370 175 494 October October NNP blog-dshr-org-2370 175 495 ( ( -LRB- blog-dshr-org-2370 175 496 11 11 CD blog-dshr-org-2370 175 497 ) ) -RRB- blog-dshr-org-2370 175 498 ► ► NFP blog-dshr-org-2370 175 499     _SP blog-dshr-org-2370 175 500 September September NNP blog-dshr-org-2370 175 501 ( ( -LRB- blog-dshr-org-2370 175 502 5 5 CD blog-dshr-org-2370 175 503 ) ) -RRB- blog-dshr-org-2370 175 504 ► ► NFP blog-dshr-org-2370 175 505     _SP blog-dshr-org-2370 175 506 August August NNP blog-dshr-org-2370 175 507 ( ( -LRB- blog-dshr-org-2370 175 508 3 3 CD blog-dshr-org-2370 175 509 ) ) -RRB- blog-dshr-org-2370 175 510 ► ► NFP blog-dshr-org-2370 175 511     _SP blog-dshr-org-2370 175 512 July July NNP blog-dshr-org-2370 175 513 ( ( -LRB- blog-dshr-org-2370 175 514 3 3 CD blog-dshr-org-2370 175 515 ) ) -RRB- blog-dshr-org-2370 175 516 ► ► NFP blog-dshr-org-2370 175 517     _SP blog-dshr-org-2370 175 518 June June NNP blog-dshr-org-2370 175 519 ( ( -LRB- blog-dshr-org-2370 175 520 8) 8) CD blog-dshr-org-2370 175 521 ► ► CD blog-dshr-org-2370 175 522     _SP blog-dshr-org-2370 175 523 May May NNP blog-dshr-org-2370 175 524 ( ( -LRB- blog-dshr-org-2370 175 525 10 10 CD blog-dshr-org-2370 175 526 ) ) -RRB- blog-dshr-org-2370 175 527 ► ► NFP blog-dshr-org-2370 175 528     _SP blog-dshr-org-2370 175 529 April April NNP blog-dshr-org-2370 175 530 ( ( -LRB- blog-dshr-org-2370 175 531 6 6 CD blog-dshr-org-2370 175 532 ) ) -RRB- blog-dshr-org-2370 175 533 ► ► NFP blog-dshr-org-2370 175 534     _SP blog-dshr-org-2370 175 535 March March NNP blog-dshr-org-2370 175 536 ( ( -LRB- blog-dshr-org-2370 175 537 6 6 CD blog-dshr-org-2370 175 538 ) ) -RRB- blog-dshr-org-2370 175 539 ► ► NFP blog-dshr-org-2370 175 540     _SP blog-dshr-org-2370 175 541 February February NNP blog-dshr-org-2370 175 542 ( ( -LRB- blog-dshr-org-2370 175 543 7 7 CD blog-dshr-org-2370 175 544 ) ) -RRB- blog-dshr-org-2370 175 545 ► ► NFP blog-dshr-org-2370 175 546     _SP blog-dshr-org-2370 175 547 January January NNP blog-dshr-org-2370 175 548 ( ( -LRB- blog-dshr-org-2370 175 549 4 4 CD blog-dshr-org-2370 175 550 ) ) -RRB- blog-dshr-org-2370 175 551 ► ► CD blog-dshr-org-2370 175 552     _SP blog-dshr-org-2370 175 553 2014 2014 CD blog-dshr-org-2370 175 554 ( ( -LRB- blog-dshr-org-2370 175 555 68 68 CD blog-dshr-org-2370 175 556 ) ) -RRB- blog-dshr-org-2370 175 557 ► ► NFP blog-dshr-org-2370 175 558     _SP blog-dshr-org-2370 175 559 December December NNP blog-dshr-org-2370 175 560 ( ( -LRB- blog-dshr-org-2370 175 561 7 7 CD blog-dshr-org-2370 175 562 ) ) -RRB- blog-dshr-org-2370 175 563 ► ► NFP blog-dshr-org-2370 175 564     _SP blog-dshr-org-2370 175 565 November November NNP blog-dshr-org-2370 175 566 ( ( -LRB- blog-dshr-org-2370 175 567 8) 8) CD blog-dshr-org-2370 175 568 ► ► CD blog-dshr-org-2370 175 569     _SP blog-dshr-org-2370 175 570 October October NNP blog-dshr-org-2370 175 571 ( ( -LRB- blog-dshr-org-2370 175 572 6 6 CD blog-dshr-org-2370 175 573 ) ) -RRB- blog-dshr-org-2370 175 574 ► ► NFP blog-dshr-org-2370 175 575     _SP blog-dshr-org-2370 175 576 September September NNP blog-dshr-org-2370 175 577 ( ( -LRB- blog-dshr-org-2370 175 578 8) 8) CD blog-dshr-org-2370 175 579 ► ► CD blog-dshr-org-2370 175 580     _SP blog-dshr-org-2370 175 581 August August NNP blog-dshr-org-2370 175 582 ( ( -LRB- blog-dshr-org-2370 175 583 7 7 CD blog-dshr-org-2370 175 584 ) ) -RRB- blog-dshr-org-2370 175 585 ► ► NFP blog-dshr-org-2370 175 586     _SP blog-dshr-org-2370 175 587 July July NNP blog-dshr-org-2370 175 588 ( ( -LRB- blog-dshr-org-2370 175 589 3 3 CD blog-dshr-org-2370 175 590 ) ) -RRB- blog-dshr-org-2370 175 591 ► ► NFP blog-dshr-org-2370 175 592     _SP blog-dshr-org-2370 175 593 June June NNP blog-dshr-org-2370 175 594 ( ( -LRB- blog-dshr-org-2370 175 595 5 5 CD blog-dshr-org-2370 175 596 ) ) -RRB- blog-dshr-org-2370 175 597 ► ► NFP blog-dshr-org-2370 175 598     _SP blog-dshr-org-2370 175 599 May May NNP blog-dshr-org-2370 175 600 ( ( -LRB- blog-dshr-org-2370 175 601 6 6 CD blog-dshr-org-2370 175 602 ) ) -RRB- blog-dshr-org-2370 175 603 ► ► NFP blog-dshr-org-2370 175 604     _SP blog-dshr-org-2370 175 605 April April NNP blog-dshr-org-2370 175 606 ( ( -LRB- blog-dshr-org-2370 175 607 5 5 CD blog-dshr-org-2370 175 608 ) ) -RRB- blog-dshr-org-2370 175 609 ► ► NFP blog-dshr-org-2370 175 610     _SP blog-dshr-org-2370 175 611 March March NNP blog-dshr-org-2370 175 612 ( ( -LRB- blog-dshr-org-2370 175 613 6 6 CD blog-dshr-org-2370 175 614 ) ) -RRB- blog-dshr-org-2370 175 615 ► ► NFP blog-dshr-org-2370 175 616     _SP blog-dshr-org-2370 175 617 February February NNP blog-dshr-org-2370 175 618 ( ( -LRB- blog-dshr-org-2370 175 619 2 2 CD blog-dshr-org-2370 175 620 ) ) -RRB- blog-dshr-org-2370 175 621 ► ► NFP blog-dshr-org-2370 175 622     _SP blog-dshr-org-2370 175 623 January January NNP blog-dshr-org-2370 175 624 ( ( -LRB- blog-dshr-org-2370 175 625 5 5 CD blog-dshr-org-2370 175 626 ) ) -RRB- blog-dshr-org-2370 175 627 ► ► CD blog-dshr-org-2370 175 628     _SP blog-dshr-org-2370 175 629 2013 2013 CD blog-dshr-org-2370 175 630 ( ( -LRB- blog-dshr-org-2370 175 631 67 67 CD blog-dshr-org-2370 175 632 ) ) -RRB- blog-dshr-org-2370 175 633 ► ► NFP blog-dshr-org-2370 175 634     _SP blog-dshr-org-2370 175 635 December December NNP blog-dshr-org-2370 175 636 ( ( -LRB- blog-dshr-org-2370 175 637 3 3 CD blog-dshr-org-2370 175 638 ) ) -RRB- blog-dshr-org-2370 175 639 ► ► NFP blog-dshr-org-2370 175 640     _SP blog-dshr-org-2370 175 641 November November NNP blog-dshr-org-2370 175 642 ( ( -LRB- blog-dshr-org-2370 175 643 6 6 CD blog-dshr-org-2370 175 644 ) ) -RRB- blog-dshr-org-2370 175 645 ► ► NFP blog-dshr-org-2370 175 646     _SP blog-dshr-org-2370 175 647 October October NNP blog-dshr-org-2370 175 648 ( ( -LRB- blog-dshr-org-2370 175 649 7 7 CD blog-dshr-org-2370 175 650 ) ) -RRB- blog-dshr-org-2370 175 651 ► ► NFP blog-dshr-org-2370 175 652     _SP blog-dshr-org-2370 175 653 September September NNP blog-dshr-org-2370 175 654 ( ( -LRB- blog-dshr-org-2370 175 655 6 6 CD blog-dshr-org-2370 175 656 ) ) -RRB- blog-dshr-org-2370 175 657 ► ► NFP blog-dshr-org-2370 175 658     _SP blog-dshr-org-2370 175 659 August August NNP blog-dshr-org-2370 175 660 ( ( -LRB- blog-dshr-org-2370 175 661 3 3 CD blog-dshr-org-2370 175 662 ) ) -RRB- blog-dshr-org-2370 175 663 ► ► NFP blog-dshr-org-2370 175 664     _SP blog-dshr-org-2370 175 665 July July NNP blog-dshr-org-2370 175 666 ( ( -LRB- blog-dshr-org-2370 175 667 5 5 CD blog-dshr-org-2370 175 668 ) ) -RRB- blog-dshr-org-2370 175 669 ► ► NFP blog-dshr-org-2370 175 670     _SP blog-dshr-org-2370 175 671 June June NNP blog-dshr-org-2370 175 672 ( ( -LRB- blog-dshr-org-2370 175 673 6 6 CD blog-dshr-org-2370 175 674 ) ) -RRB- blog-dshr-org-2370 175 675 ► ► NFP blog-dshr-org-2370 175 676     _SP blog-dshr-org-2370 175 677 May May NNP blog-dshr-org-2370 175 678 ( ( -LRB- blog-dshr-org-2370 175 679 5 5 CD blog-dshr-org-2370 175 680 ) ) -RRB- blog-dshr-org-2370 175 681 ► ► NFP blog-dshr-org-2370 175 682     _SP blog-dshr-org-2370 175 683 April April NNP blog-dshr-org-2370 175 684 ( ( -LRB- blog-dshr-org-2370 175 685 9 9 CD blog-dshr-org-2370 175 686 ) ) -RRB- blog-dshr-org-2370 175 687 ► ► NFP blog-dshr-org-2370 175 688     _SP blog-dshr-org-2370 175 689 March March NNP blog-dshr-org-2370 175 690 ( ( -LRB- blog-dshr-org-2370 175 691 5 5 CD blog-dshr-org-2370 175 692 ) ) -RRB- blog-dshr-org-2370 175 693 ► ► NFP blog-dshr-org-2370 175 694     _SP blog-dshr-org-2370 175 695 February February NNP blog-dshr-org-2370 175 696 ( ( -LRB- blog-dshr-org-2370 175 697 5 5 CD blog-dshr-org-2370 175 698 ) ) -RRB- blog-dshr-org-2370 175 699 ► ► NFP blog-dshr-org-2370 175 700     _SP blog-dshr-org-2370 175 701 January January NNP blog-dshr-org-2370 175 702 ( ( -LRB- blog-dshr-org-2370 175 703 7 7 CD blog-dshr-org-2370 175 704 ) ) -RRB- blog-dshr-org-2370 175 705 ► ► CD blog-dshr-org-2370 175 706     _SP blog-dshr-org-2370 175 707 2012 2012 CD blog-dshr-org-2370 175 708 ( ( -LRB- blog-dshr-org-2370 175 709 43 43 CD blog-dshr-org-2370 175 710 ) ) -RRB- blog-dshr-org-2370 175 711 ► ► NFP blog-dshr-org-2370 175 712     _SP blog-dshr-org-2370 175 713 December December NNP blog-dshr-org-2370 175 714 ( ( -LRB- blog-dshr-org-2370 175 715 4 4 CD blog-dshr-org-2370 175 716 ) ) -RRB- blog-dshr-org-2370 175 717 ► ► NFP blog-dshr-org-2370 175 718     _SP blog-dshr-org-2370 175 719 November November NNP blog-dshr-org-2370 175 720 ( ( -LRB- blog-dshr-org-2370 175 721 4 4 CD blog-dshr-org-2370 175 722 ) ) -RRB- blog-dshr-org-2370 175 723 ► ► NFP blog-dshr-org-2370 175 724     _SP blog-dshr-org-2370 175 725 October October NNP blog-dshr-org-2370 175 726 ( ( -LRB- blog-dshr-org-2370 175 727 6 6 CD blog-dshr-org-2370 175 728 ) ) -RRB- blog-dshr-org-2370 175 729 ► ► NFP blog-dshr-org-2370 175 730     _SP blog-dshr-org-2370 175 731 September September NNP blog-dshr-org-2370 175 732 ( ( -LRB- blog-dshr-org-2370 175 733 6 6 CD blog-dshr-org-2370 175 734 ) ) -RRB- blog-dshr-org-2370 175 735 ► ► NFP blog-dshr-org-2370 175 736     _SP blog-dshr-org-2370 175 737 August August NNP blog-dshr-org-2370 175 738 ( ( -LRB- blog-dshr-org-2370 175 739 2 2 CD blog-dshr-org-2370 175 740 ) ) -RRB- blog-dshr-org-2370 175 741 ► ► NFP blog-dshr-org-2370 175 742     _SP blog-dshr-org-2370 175 743 July July NNP blog-dshr-org-2370 175 744 ( ( -LRB- blog-dshr-org-2370 175 745 5 5 CD blog-dshr-org-2370 175 746 ) ) -RRB- blog-dshr-org-2370 175 747 ► ► NFP blog-dshr-org-2370 175 748     _SP blog-dshr-org-2370 175 749 June June NNP blog-dshr-org-2370 175 750 ( ( -LRB- blog-dshr-org-2370 175 751 2 2 CD blog-dshr-org-2370 175 752 ) ) -RRB- blog-dshr-org-2370 175 753 ► ► NFP blog-dshr-org-2370 175 754     _SP blog-dshr-org-2370 175 755 May May NNP blog-dshr-org-2370 175 756 ( ( -LRB- blog-dshr-org-2370 175 757 5 5 CD blog-dshr-org-2370 175 758 ) ) -RRB- blog-dshr-org-2370 175 759 ► ► NFP blog-dshr-org-2370 175 760     _SP blog-dshr-org-2370 175 761 March March NNP blog-dshr-org-2370 175 762 ( ( -LRB- blog-dshr-org-2370 175 763 1 1 CD blog-dshr-org-2370 175 764 ) ) -RRB- blog-dshr-org-2370 175 765 ► ► NFP blog-dshr-org-2370 175 766     _SP blog-dshr-org-2370 175 767 February February NNP blog-dshr-org-2370 175 768 ( ( -LRB- blog-dshr-org-2370 175 769 5 5 CD blog-dshr-org-2370 175 770 ) ) -RRB- blog-dshr-org-2370 175 771 ► ► NFP blog-dshr-org-2370 175 772     _SP blog-dshr-org-2370 175 773 January January NNP blog-dshr-org-2370 175 774 ( ( -LRB- blog-dshr-org-2370 175 775 3 3 CD blog-dshr-org-2370 175 776 ) ) -RRB- blog-dshr-org-2370 175 777 ► ► CD blog-dshr-org-2370 175 778     _SP blog-dshr-org-2370 175 779 2011 2011 CD blog-dshr-org-2370 175 780 ( ( -LRB- blog-dshr-org-2370 175 781 40 40 CD blog-dshr-org-2370 175 782 ) ) -RRB- blog-dshr-org-2370 175 783 ► ► NFP blog-dshr-org-2370 175 784     _SP blog-dshr-org-2370 175 785 December December NNP blog-dshr-org-2370 175 786 ( ( -LRB- blog-dshr-org-2370 175 787 2 2 CD blog-dshr-org-2370 175 788 ) ) -RRB- blog-dshr-org-2370 175 789 ► ► NFP blog-dshr-org-2370 175 790     _SP blog-dshr-org-2370 175 791 November November NNP blog-dshr-org-2370 175 792 ( ( -LRB- blog-dshr-org-2370 175 793 1 1 CD blog-dshr-org-2370 175 794 ) ) -RRB- blog-dshr-org-2370 175 795 ► ► NFP blog-dshr-org-2370 175 796     _SP blog-dshr-org-2370 175 797 October October NNP blog-dshr-org-2370 175 798 ( ( -LRB- blog-dshr-org-2370 175 799 7 7 CD blog-dshr-org-2370 175 800 ) ) -RRB- blog-dshr-org-2370 175 801 ► ► NFP blog-dshr-org-2370 175 802     _SP blog-dshr-org-2370 175 803 September September NNP blog-dshr-org-2370 175 804 ( ( -LRB- blog-dshr-org-2370 175 805 3 3 CD blog-dshr-org-2370 175 806 ) ) -RRB- blog-dshr-org-2370 175 807 ► ► NFP blog-dshr-org-2370 175 808     _SP blog-dshr-org-2370 175 809 August August NNP blog-dshr-org-2370 175 810 ( ( -LRB- blog-dshr-org-2370 175 811 5 5 CD blog-dshr-org-2370 175 812 ) ) -RRB- blog-dshr-org-2370 175 813 ► ► NFP blog-dshr-org-2370 175 814     _SP blog-dshr-org-2370 175 815 July July NNP blog-dshr-org-2370 175 816 ( ( -LRB- blog-dshr-org-2370 175 817 2 2 CD blog-dshr-org-2370 175 818 ) ) -RRB- blog-dshr-org-2370 175 819 ► ► NFP blog-dshr-org-2370 175 820     _SP blog-dshr-org-2370 175 821 June June NNP blog-dshr-org-2370 175 822 ( ( -LRB- blog-dshr-org-2370 175 823 2 2 CD blog-dshr-org-2370 175 824 ) ) -RRB- blog-dshr-org-2370 175 825 ► ► NFP blog-dshr-org-2370 175 826     _SP blog-dshr-org-2370 175 827 May May NNP blog-dshr-org-2370 175 828 ( ( -LRB- blog-dshr-org-2370 175 829 2 2 CD blog-dshr-org-2370 175 830 ) ) -RRB- blog-dshr-org-2370 175 831 ► ► NFP blog-dshr-org-2370 175 832     _SP blog-dshr-org-2370 175 833 April April NNP blog-dshr-org-2370 175 834 ( ( -LRB- blog-dshr-org-2370 175 835 4 4 CD blog-dshr-org-2370 175 836 ) ) -RRB- blog-dshr-org-2370 175 837 ► ► NFP blog-dshr-org-2370 175 838     _SP blog-dshr-org-2370 175 839 March March NNP blog-dshr-org-2370 175 840 ( ( -LRB- blog-dshr-org-2370 175 841 4 4 CD blog-dshr-org-2370 175 842 ) ) -RRB- blog-dshr-org-2370 175 843 ► ► NFP blog-dshr-org-2370 175 844     _SP blog-dshr-org-2370 175 845 February February NNP blog-dshr-org-2370 175 846 ( ( -LRB- blog-dshr-org-2370 175 847 4 4 CD blog-dshr-org-2370 175 848 ) ) -RRB- blog-dshr-org-2370 175 849 ► ► NFP blog-dshr-org-2370 175 850     _SP blog-dshr-org-2370 175 851 January January NNP blog-dshr-org-2370 175 852 ( ( -LRB- blog-dshr-org-2370 175 853 4 4 CD blog-dshr-org-2370 175 854 ) ) -RRB- blog-dshr-org-2370 175 855 ► ► CD blog-dshr-org-2370 175 856     _SP blog-dshr-org-2370 175 857 2010 2010 CD blog-dshr-org-2370 175 858 ( ( -LRB- blog-dshr-org-2370 175 859 17 17 CD blog-dshr-org-2370 175 860 ) ) -RRB- blog-dshr-org-2370 175 861 ► ► NFP blog-dshr-org-2370 175 862     _SP blog-dshr-org-2370 175 863 December December NNP blog-dshr-org-2370 175 864 ( ( -LRB- blog-dshr-org-2370 175 865 5 5 CD blog-dshr-org-2370 175 866 ) ) -RRB- blog-dshr-org-2370 175 867 ► ► NFP blog-dshr-org-2370 175 868     _SP blog-dshr-org-2370 175 869 November November NNP blog-dshr-org-2370 175 870 ( ( -LRB- blog-dshr-org-2370 175 871 3 3 CD blog-dshr-org-2370 175 872 ) ) -RRB- blog-dshr-org-2370 175 873 ► ► NFP blog-dshr-org-2370 175 874     _SP blog-dshr-org-2370 175 875 October October NNP blog-dshr-org-2370 175 876 ( ( -LRB- blog-dshr-org-2370 175 877 4 4 CD blog-dshr-org-2370 175 878 ) ) -RRB- blog-dshr-org-2370 175 879 ► ► NFP blog-dshr-org-2370 175 880     _SP blog-dshr-org-2370 175 881 September September NNP blog-dshr-org-2370 175 882 ( ( -LRB- blog-dshr-org-2370 175 883 2 2 CD blog-dshr-org-2370 175 884 ) ) -RRB- blog-dshr-org-2370 175 885 ► ► NFP blog-dshr-org-2370 175 886     _SP blog-dshr-org-2370 175 887 July July NNP blog-dshr-org-2370 175 888 ( ( -LRB- blog-dshr-org-2370 175 889 1 1 CD blog-dshr-org-2370 175 890 ) ) -RRB- blog-dshr-org-2370 175 891 ► ► NFP blog-dshr-org-2370 175 892     _SP blog-dshr-org-2370 175 893 June June NNP blog-dshr-org-2370 175 894 ( ( -LRB- blog-dshr-org-2370 175 895 1 1 CD blog-dshr-org-2370 175 896 ) ) -RRB- blog-dshr-org-2370 175 897 ► ► NFP blog-dshr-org-2370 175 898     _SP blog-dshr-org-2370 175 899 February February NNP blog-dshr-org-2370 175 900 ( ( -LRB- blog-dshr-org-2370 175 901 1 1 CD blog-dshr-org-2370 175 902 ) ) -RRB- blog-dshr-org-2370 175 903 ► ► NFP blog-dshr-org-2370 175 904     _SP blog-dshr-org-2370 175 905 2009 2009 CD blog-dshr-org-2370 175 906 ( ( -LRB- blog-dshr-org-2370 175 907 8) 8) CD blog-dshr-org-2370 175 908 ► ► CD blog-dshr-org-2370 175 909     _SP blog-dshr-org-2370 175 910 July July NNP blog-dshr-org-2370 175 911 ( ( -LRB- blog-dshr-org-2370 175 912 1 1 CD blog-dshr-org-2370 175 913 ) ) -RRB- blog-dshr-org-2370 175 914 ► ► NFP blog-dshr-org-2370 175 915     _SP blog-dshr-org-2370 175 916 June June NNP blog-dshr-org-2370 175 917 ( ( -LRB- blog-dshr-org-2370 175 918 1 1 CD blog-dshr-org-2370 175 919 ) ) -RRB- blog-dshr-org-2370 175 920 ► ► NFP blog-dshr-org-2370 175 921     _SP blog-dshr-org-2370 175 922 May May NNP blog-dshr-org-2370 175 923 ( ( -LRB- blog-dshr-org-2370 175 924 1 1 CD blog-dshr-org-2370 175 925 ) ) -RRB- blog-dshr-org-2370 175 926 ► ► NFP blog-dshr-org-2370 175 927     _SP blog-dshr-org-2370 175 928 April April NNP blog-dshr-org-2370 175 929 ( ( -LRB- blog-dshr-org-2370 175 930 1 1 CD blog-dshr-org-2370 175 931 ) ) -RRB- blog-dshr-org-2370 175 932 ► ► NFP blog-dshr-org-2370 175 933     _SP blog-dshr-org-2370 175 934 March March NNP blog-dshr-org-2370 175 935 ( ( -LRB- blog-dshr-org-2370 175 936 2 2 CD blog-dshr-org-2370 175 937 ) ) -RRB- blog-dshr-org-2370 175 938 ► ► NFP blog-dshr-org-2370 175 939     _SP blog-dshr-org-2370 175 940 January January NNP blog-dshr-org-2370 175 941 ( ( -LRB- blog-dshr-org-2370 175 942 2 2 CD blog-dshr-org-2370 175 943 ) ) -RRB- blog-dshr-org-2370 175 944 ► ► NFP blog-dshr-org-2370 175 945     _SP blog-dshr-org-2370 175 946 2008 2008 CD blog-dshr-org-2370 175 947 ( ( -LRB- blog-dshr-org-2370 175 948 8) 8) CD blog-dshr-org-2370 175 949 ► ► CD blog-dshr-org-2370 175 950     _SP blog-dshr-org-2370 175 951 December December NNP blog-dshr-org-2370 175 952 ( ( -LRB- blog-dshr-org-2370 175 953 2 2 CD blog-dshr-org-2370 175 954 ) ) -RRB- blog-dshr-org-2370 175 955 ► ► NFP blog-dshr-org-2370 175 956     _SP blog-dshr-org-2370 175 957 March March NNP blog-dshr-org-2370 175 958 ( ( -LRB- blog-dshr-org-2370 175 959 1 1 CD blog-dshr-org-2370 175 960 ) ) -RRB- blog-dshr-org-2370 175 961 ► ► NFP blog-dshr-org-2370 175 962     _SP blog-dshr-org-2370 175 963 January January NNP blog-dshr-org-2370 175 964 ( ( -LRB- blog-dshr-org-2370 175 965 5 5 CD blog-dshr-org-2370 175 966 ) ) -RRB- blog-dshr-org-2370 175 967 ► ► CD blog-dshr-org-2370 175 968     _SP blog-dshr-org-2370 175 969 2007 2007 CD blog-dshr-org-2370 175 970 ( ( -LRB- blog-dshr-org-2370 175 971 14 14 CD blog-dshr-org-2370 175 972 ) ) -RRB- blog-dshr-org-2370 175 973 ► ► NFP blog-dshr-org-2370 175 974     _SP blog-dshr-org-2370 175 975 December December NNP blog-dshr-org-2370 175 976 ( ( -LRB- blog-dshr-org-2370 175 977 1 1 CD blog-dshr-org-2370 175 978 ) ) -RRB- blog-dshr-org-2370 175 979 ► ► NFP blog-dshr-org-2370 175 980     _SP blog-dshr-org-2370 175 981 October October NNP blog-dshr-org-2370 175 982 ( ( -LRB- blog-dshr-org-2370 175 983 3 3 CD blog-dshr-org-2370 175 984 ) ) -RRB- blog-dshr-org-2370 175 985 ► ► NFP blog-dshr-org-2370 175 986     _SP blog-dshr-org-2370 175 987 September September NNP blog-dshr-org-2370 175 988 ( ( -LRB- blog-dshr-org-2370 175 989 1 1 CD blog-dshr-org-2370 175 990 ) ) -RRB- blog-dshr-org-2370 175 991 ► ► NFP blog-dshr-org-2370 175 992     _SP blog-dshr-org-2370 175 993 August August NNP blog-dshr-org-2370 175 994 ( ( -LRB- blog-dshr-org-2370 175 995 1 1 CD blog-dshr-org-2370 175 996 ) ) -RRB- blog-dshr-org-2370 175 997 ► ► NFP blog-dshr-org-2370 175 998     _SP blog-dshr-org-2370 175 999 July July NNP blog-dshr-org-2370 175 1000 ( ( -LRB- blog-dshr-org-2370 175 1001 2 2 CD blog-dshr-org-2370 175 1002 ) ) -RRB- blog-dshr-org-2370 175 1003 ► ► NFP blog-dshr-org-2370 175 1004     _SP blog-dshr-org-2370 175 1005 June June NNP blog-dshr-org-2370 175 1006 ( ( -LRB- blog-dshr-org-2370 175 1007 3 3 CD blog-dshr-org-2370 175 1008 ) ) -RRB- blog-dshr-org-2370 175 1009 ► ► NFP blog-dshr-org-2370 175 1010     _SP blog-dshr-org-2370 175 1011 May May NNP blog-dshr-org-2370 175 1012 ( ( -LRB- blog-dshr-org-2370 175 1013 1 1 CD blog-dshr-org-2370 175 1014 ) ) -RRB- blog-dshr-org-2370 175 1015 ► ► NFP blog-dshr-org-2370 175 1016     _SP blog-dshr-org-2370 175 1017 April April NNP blog-dshr-org-2370 175 1018 ( ( -LRB- blog-dshr-org-2370 175 1019 2 2 LS blog-dshr-org-2370 175 1020 ) ) -RRB- blog-dshr-org-2370 175 1021 LOCKSS LOCKSS NNP blog-dshr-org-2370 175 1022 system system NN blog-dshr-org-2370 175 1023 has have VBZ blog-dshr-org-2370 175 1024 permission permission NN blog-dshr-org-2370 175 1025 to to TO blog-dshr-org-2370 175 1026 collect collect VB blog-dshr-org-2370 175 1027 , , , blog-dshr-org-2370 175 1028 preserve preserve VB blog-dshr-org-2370 175 1029 , , , blog-dshr-org-2370 175 1030 and and CC blog-dshr-org-2370 175 1031 serve serve VB blog-dshr-org-2370 175 1032 this this DT blog-dshr-org-2370 175 1033 Archival Archival NNP blog-dshr-org-2370 175 1034 Unit Unit NNP blog-dshr-org-2370 175 1035 . . . blog-dshr-org-2370 176 1 Simple simple JJ blog-dshr-org-2370 176 2 theme theme NN blog-dshr-org-2370 176 3 . . . blog-dshr-org-2370 177 1 Powered power VBN blog-dshr-org-2370 177 2 by by IN blog-dshr-org-2370 177 3 Blogger Blogger NNP blog-dshr-org-2370 177 4 . . .