The Skybox View

10 09, 2018

Android API Vulnerability Exposes Sensitive Customer Information

By | September 10th, 2018|Vulnerability & Threat Management|Comments Off on Android API Vulnerability Exposes Sensitive Customer Information on Android API Vulnerability Exposes Sensitive Customer Information

Attackers could use the Android API vulnerability to physically locate a user, track their online activity or target them with ads
27 08, 2018

Security Automation: Can it Fix What Ails Enterprises Cybersecurity Programs?

By | August 27th, 2018|Security Automation|Comments Off on Security Automation: Can it Fix What Ails Enterprises Cybersecurity Programs? on Security Automation: Can it Fix What Ails Enterprises Cybersecurity Programs?

New security automation survey reveals many organizations struggling with core security issues, yet automation initiatives driven by cost-cutting concerns
21 08, 2018

MikroTik Routers Infected in Mass-Scale Coinhive Cryptojacking Campaign

By | August 21st, 2018|Threat Intelligence|Comments Off on MikroTik Routers Infected in Mass-Scale Coinhive Cryptojacking Campaign on MikroTik Routers Infected in Mass-Scale Coinhive Cryptojacking Campaign

More than 200,000 MikroTik routers have been infected worldwide, an upgrade to the firmware is available
15 08, 2018

Ransomware in India: the SamSam Ransomware and Beyond

By | August 15th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware in India: the SamSam Ransomware and Beyond on Ransomware in India: the SamSam Ransomware and Beyond

Survey shows ransomware in India is prevalent, ranking sixth among countries affected by SamSam — how will they cope?
27 07, 2018

Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks

By | July 27th, 2018|Threat Intelligence|Comments Off on Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks on Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks

A recently published Oracle WebLogic vulnerability has been exploited in large-scale campaigns, many to mine cryptocurrency for the attackers such as Iuoxk Group
26 07, 2018

Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

By | July 26th, 2018|Vulnerability & Threat Management|Comments Off on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

Report shows malicious cryptominers and ransomware trading places in attack popularity between the last half of 2017 and first half of 2018
20 07, 2018

Spectre Reemerges With Two New Variants

By | July 20th, 2018|Vulnerability & Threat Management|Comments Off on Spectre Reemerges With Two New Variants on Spectre Reemerges With Two New Variants

The Intel chip-level flaw is back with two new variants, Spectre 1.1 and 1.2, with some patches available
3 07, 2018

Cisco ASA Vulnerabilities See POC and Active Exploits

By | July 3rd, 2018|Uncategorized, Vulnerability & Threat Management|Comments Off on Cisco ASA Vulnerabilities See POC and Active Exploits on Cisco ASA Vulnerabilities See POC and Active Exploits

Cisco confirms limited exploitation in the wild of a recently disclosed Cisco ASA flaw, still cause for concern around EXTRABACON and EPICBANANA
11 06, 2018

Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability

By | June 11th, 2018|Vulnerability & Threat Management|Comments Off on Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability on Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability

An archive extraction vulnerability known as “Zip Slip” is putting thousands of open source projects across many ecosystems at risk
28 05, 2018

VPNFilter Malware: What we know so far on the router threat

By | May 28th, 2018|Threat Intelligence|Comments Off on VPNFilter Malware: What we know so far on the router threat on VPNFilter Malware: What we know so far on the router threat

A new destructive VPNFilter malware has compromised 500,000 networking devices worldwide