The WannaCry Ransomware may indicate other attacks. Attackers were exploiting the vulnerability and deploying malware before WannaCry turned the exploit into a worm. Advanced attackers used the same vulnerability to steal sensitive data before WannaCry first appeared. There is evidence of remote control capabilities over machines subject to that vulnerability. Join SANS Instructor Jake Williams and Gil Barak from Secdo Ltd. for this breaking news.