The Skybox View

17 10, 2017

KRACK Targets WPA2 Protocol Putting Millions of Devices at Risk

By | October 17th, 2017|Vulnerability & Threat Management|Comments Off on KRACK Targets WPA2 Protocol Putting Millions of Devices at Risk on KRACK Targets WPA2 Protocol Putting Millions of Devices at Risk

Researchers’ POC of KRACK, a key reinstallation attack on WPA2 protocols, impacts all modern protected Wi–Fi networks
17 10, 2017

Adobe Flash Exploit Delivering FINSPY to UN Member Countries

By | October 17th, 2017|Threat Intelligence, Vulnerability & Threat Management|Comments Off on Adobe Flash Exploit Delivering FINSPY to UN Member Countries on Adobe Flash Exploit Delivering FINSPY to UN Member Countries

The BlackOasis threat actor is exploiting an Adobe Flash vulnerability to deliver the FINSPY spyware
5 10, 2017

ZNIU: Mobile Malware and Dirty COW

By | October 5th, 2017|Vulnerability & Threat Management|Comments Off on ZNIU: Mobile Malware and Dirty COW on ZNIU: Mobile Malware and Dirty COW

How a Dirty COW steals your information and your money
21 09, 2017

Microsoft Fixes .NET Zero–Day Exploited to Install Espionage Spyware

By | September 21st, 2017|Cybercrime, Patch Tuesday, Vulnerability & Threat Management|Comments Off on Microsoft Fixes .NET Zero–Day Exploited to Install Espionage Spyware on Microsoft Fixes .NET Zero–Day Exploited to Install Espionage Spyware

The .Net flaw is one of more than 80 vulnerabilities Microsoft fixed during September’s Patch Tuesday.
13 09, 2017

BlueBorne Threatens 5.3 Billion Devices

By | September 13th, 2017|Vulnerability & Threat Management|Comments Off on BlueBorne Threatens 5.3 Billion Devices on BlueBorne Threatens 5.3 Billion Devices

Eight zero–day vulnerabilities have been announced affecting Android, iOS, Windows and Linux devices
28 08, 2017

Attackers Go Retro

By | August 28th, 2017|Vulnerability & Threat Management|Comments Off on Attackers Go Retro on Attackers Go Retro

Why old vulnerabilities are still able to wreak havoc on enterprises and network worms are back in style
10 08, 2017

Next on Your Summer Reading List: Cisco’s Midyear Report

By | August 10th, 2017|Vulnerability & Threat Management|Comments Off on Next on Your Summer Reading List: Cisco’s Midyear Report on Next on Your Summer Reading List: Cisco’s Midyear Report

Cisco releases its Bible–length cybersecurity report. Aside from the stats, makes a Hail Mary to improve security (and management) through vendor consolidation.
4 08, 2017

CVEs Abound, But Not Enough to Secure the Enterprise

By | August 4th, 2017|Vulnerability & Threat Management|Comments Off on CVEs Abound, But Not Enough to Secure the Enterprise on CVEs Abound, But Not Enough to Secure the Enterprise

While MITRE improves catalog methods, it still falls short to improve vulnerability management programs and prioritization to tackle today’s threats.
28 06, 2017

Petya NotPetya? Ransomware NotRansomware?

By | June 28th, 2017|Cybercrime|Comments Off on Petya NotPetya? Ransomware NotRansomware? on Petya NotPetya? Ransomware NotRansomware?

A day after the Petya attack outbreak, we’re left with a plenty of questions and a bit more insight.
27 06, 2017

Petya Ransomware Attack: What We Know So Far

By | June 27th, 2017|Cybercrime|Comments Off on Petya Ransomware Attack: What We Know So Far on Petya Ransomware Attack: What We Know So Far

Petya (or NotPetya) spread quickly across Europe and the US, affecting business, government agencies and critical infrastructure