I read this interesting article on threatpost where the ransomware gangs still use the old vulnerabilities to exploit and target the victims.
So what are those vulnerabilities and what do they do? How can you be safe from these vulnerabilities.
Below...