The Skybox View

3 07, 2018

Cisco ASA Vulnerabilities See POC and Active Exploits

By | July 3rd, 2018|Uncategorized, Vulnerability & Threat Management|Comments Off on Cisco ASA Vulnerabilities See POC and Active Exploits on Cisco ASA Vulnerabilities See POC and Active Exploits

Cisco confirms limited exploitation in the wild of a recently disclosed Cisco ASA flaw, still cause for concern around EXTRABACON and EPICBANANA
11 06, 2018

Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability

By | June 11th, 2018|Vulnerability & Threat Management|Comments Off on Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability on Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability

An archive extraction vulnerability known as “Zip Slip” is putting thousands of open source projects across many ecosystems at risk
28 05, 2018

VPNFilter Malware: What we know so far on the router threat

By | May 28th, 2018|Threat Intelligence|Comments Off on VPNFilter Malware: What we know so far on the router threat on VPNFilter Malware: What we know so far on the router threat

A new destructive VPNFilter malware has compromised 500,000 networking devices worldwide
23 05, 2018

Speculative Store Buffer Bypass, Rogue System Register Read

By | May 23rd, 2018|Vulnerability & Threat Management|Comments Off on Speculative Store Buffer Bypass, Rogue System Register Read on Speculative Store Buffer Bypass, Rogue System Register Read

Bug bounties pay off, uncovering two more side-channel flaws in the wake of Meltdown and Spectre
10 05, 2018

Double Kill Exploit Jumps From MS Office to Internet Explorer

By | May 10th, 2018|Threat Intelligence|Comments Off on Double Kill Exploit Jumps From MS Office to Internet Explorer on Double Kill Exploit Jumps From MS Office to Internet Explorer

The Double Kill exploit of a VBScript Engine vulnerability uses a first-of-its-kind attack method we’ll likely see more of in the future
9 05, 2018

Ransomware Packs a Punch but Malicious Cryptomining Spikes

By | May 9th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware Packs a Punch but Malicious Cryptomining Spikes on Ransomware Packs a Punch but Malicious Cryptomining Spikes

While ransomware threats have given some ground to malicious cryptomining, the attacks still hit hard
7 05, 2018

How Will NHS Windows 10 Upgrade Impact Risk?

By | May 7th, 2018|Vulnerability & Threat Management|Comments Off on How Will NHS Windows 10 Upgrade Impact Risk? on How Will NHS Windows 10 Upgrade Impact Risk?

Move to the latest Windows OS brings robust security features but also more vulnerabilities and exploits
27 04, 2018

Orangeworm and Abbott Shed Light on Healthcare Cyberthreat

By | April 27th, 2018|Healthcare|Comments Off on Orangeworm and Abbott Shed Light on Healthcare Cyberthreat on Orangeworm and Abbott Shed Light on Healthcare Cyberthreat

The Orangeworm attack targeting healthcare organizations and vulnerabilities in Abbott cardiac devices raise fresh concerns of cyber issues in industry
26 04, 2018

Drupalgeddon2 Attack Puts Sites at Risk Worldwide

By | April 26th, 2018|Threat Intelligence|Comments Off on Drupalgeddon2 Attack Puts Sites at Risk Worldwide on Drupalgeddon2 Attack Puts Sites at Risk Worldwide

Several malware families including Monero cryptominer and the Muhstik botnet are using the Drupalgeddon2 vulnerability
12 04, 2018

Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw

By | April 12th, 2018|Threat Intelligence, Vulnerability & Threat Management|Comments Off on Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw on Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw

Bot uses Shodan to detect vulnerable devices, 200,000 affected worldwide by Cisco Smart Install Client vulnerability