The Skybox View

12 04, 2018

Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw

By | April 12th, 2018|Threat Intelligence, Vulnerability & Threat Management|Comments Off on Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw on Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw

Bot uses Shodan to detect vulnerable devices, 200,000 affected worldwide by Cisco Smart Install Client vulnerability
29 03, 2018

The Cryptomining Malware Family

By | March 29th, 2018|Threat Intelligence|Comments Off on The Cryptomining Malware Family on The Cryptomining Malware Family

Cryptomining malware comes in many shapes and sizes, from browser-based software to cryptocurrency wallet stealers and dedicated applications
28 03, 2018

Cryptominers More Lucrative, Lower Risk Than Ransomware

By | March 28th, 2018|Threat Intelligence|Comments Off on Cryptominers More Lucrative, Lower Risk Than Ransomware on Cryptominers More Lucrative, Lower Risk Than Ransomware

What is cryptomining? What makes it malicious? And why is it becoming the darling of cybercriminals?
14 03, 2018

March Patch Tuesday and AMD Processor Vulnerability

By | March 14th, 2018|Patch Tuesday|Comments Off on March Patch Tuesday and AMD Processor Vulnerability on March Patch Tuesday and AMD Processor Vulnerability

Microsoft’s March Patch Tuesday includes CredSSP RCE vulnerability present in every version of Windows to date, and serious flaws announced in AMD processors
20 02, 2018

Triton Malware Can Remotely Target Critical Infrastructure

By | February 20th, 2018|Threat Intelligence|Comments Off on Triton Malware Can Remotely Target Critical Infrastructure on Triton Malware Can Remotely Target Critical Infrastructure

The highly sophisticated OT malware represents the next evolution of threats to industrial control systems
14 02, 2018

Top Malware in 2018: What to watch for

By | February 14th, 2018|Threat Intelligence|Comments Off on Top Malware in 2018: What to watch for on Top Malware in 2018: What to watch for

Skybox's new Vulnerability and Threat Trends Report lays out the top malware and points to the trend of hybrid, changeling malware
7 02, 2018

6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab

By | February 7th, 2018|Vulnerability & Threat Management|Comments Off on 6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab on 6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab

Skybox's new Vulnerability and Threat Trends Report lays out the vulnerabilities to play a major role in 2018's threat landscape
6 02, 2018

North Korea Uses Adobe Flash Zero-Day to Target South

By | February 6th, 2018|Threat Intelligence|Comments Off on North Korea Uses Adobe Flash Zero-Day to Target South on North Korea Uses Adobe Flash Zero-Day to Target South

The Flash Zero-Day has been exploited in the wild since November 2017 targeting South Korea. Patch now available.
4 01, 2018

Meltdown, Spectre Reach Beyond Intel as Vendors Release Patches

By | January 4th, 2018|Vulnerability & Threat Management|Comments Off on Meltdown, Spectre Reach Beyond Intel as Vendors Release Patches on Meltdown, Spectre Reach Beyond Intel as Vendors Release Patches

CPU information disclosure vulnerabilities affect AMD and Arm as well as Intel microprocessors
3 01, 2018

Intel Vulnerability at Processor Chip Level Will Affect Performance

By | January 3rd, 2018|Threat Intelligence|Comments Off on Intel Vulnerability at Processor Chip Level Will Affect Performance on Intel Vulnerability at Processor Chip Level Will Affect Performance

The Intel vulnerability requires an OS–level patch to Linux, Windows and macOS, slowing down machines by up to 30 percent