The Skybox View

10 05, 2018

Double Kill Exploit Jumps From MS Office to Internet Explorer

By | May 10th, 2018|Threat Intelligence|Comments Off on Double Kill Exploit Jumps From MS Office to Internet Explorer on Double Kill Exploit Jumps From MS Office to Internet Explorer

The Double Kill exploit of a VBScript Engine vulnerability uses a first-of-its-kind attack method we’ll likely see more of in the future
9 05, 2018

Ransomware Packs a Punch but Malicious Cryptomining Spikes

By | May 9th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware Packs a Punch but Malicious Cryptomining Spikes on Ransomware Packs a Punch but Malicious Cryptomining Spikes

While ransomware threats have given some ground to malicious cryptomining, the attacks still hit hard
7 05, 2018

How Will NHS Windows 10 Upgrade Impact Risk?

By | May 7th, 2018|Vulnerability & Threat Management|Comments Off on How Will NHS Windows 10 Upgrade Impact Risk? on How Will NHS Windows 10 Upgrade Impact Risk?

Move to the latest Windows OS brings robust security features but also more vulnerabilities and exploits
27 04, 2018

Orangeworm and Abbott Shed Light on Healthcare Cyberthreat

By | April 27th, 2018|Healthcare|Comments Off on Orangeworm and Abbott Shed Light on Healthcare Cyberthreat on Orangeworm and Abbott Shed Light on Healthcare Cyberthreat

The Orangeworm attack targeting healthcare organizations and vulnerabilities in Abbott cardiac devices raise fresh concerns of cyber issues in industry
26 04, 2018

Drupalgeddon2 Attack Puts Sites at Risk Worldwide

By | April 26th, 2018|Threat Intelligence|Comments Off on Drupalgeddon2 Attack Puts Sites at Risk Worldwide on Drupalgeddon2 Attack Puts Sites at Risk Worldwide

Several malware families including Monero cryptominer and the Muhstik botnet are using the Drupalgeddon2 vulnerability
12 04, 2018

Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw

By | April 12th, 2018|Threat Intelligence, Vulnerability & Threat Management|Comments Off on Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw on Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw

Bot uses Shodan to detect vulnerable devices, 200,000 affected worldwide by Cisco Smart Install Client vulnerability
29 03, 2018

The Cryptomining Malware Family

By | March 29th, 2018|Threat Intelligence|Comments Off on The Cryptomining Malware Family on The Cryptomining Malware Family

Cryptomining malware comes in many shapes and sizes, from browser-based software to cryptocurrency wallet stealers and dedicated applications
28 03, 2018

Cryptominers More Lucrative, Lower Risk Than Ransomware

By | March 28th, 2018|Threat Intelligence|Comments Off on Cryptominers More Lucrative, Lower Risk Than Ransomware on Cryptominers More Lucrative, Lower Risk Than Ransomware

What is cryptomining? What makes it malicious? And why is it becoming the darling of cybercriminals?
14 03, 2018

March Patch Tuesday and AMD Processor Vulnerability

By | March 14th, 2018|Patch Tuesday|Comments Off on March Patch Tuesday and AMD Processor Vulnerability on March Patch Tuesday and AMD Processor Vulnerability

Microsoft’s March Patch Tuesday includes CredSSP RCE vulnerability present in every version of Windows to date, and serious flaws announced in AMD processors
20 02, 2018

Triton Malware Can Remotely Target Critical Infrastructure

By | February 20th, 2018|Threat Intelligence|Comments Off on Triton Malware Can Remotely Target Critical Infrastructure on Triton Malware Can Remotely Target Critical Infrastructure

The highly sophisticated OT malware represents the next evolution of threats to industrial control systems