The latest edition of Skybox’s Vulnerability and Threat Trends report was released today. The report examines the new vulnerabilities published in 2019, newly developed exploits, new exploit–based malware and attacks, current threat tactics and more. Vulnerabilities do not exist in a vacuum and they cannot be managed in isolation. In order to know what to [...]
A couple of weeks ago, the world woke up to the news of the first BlueKeep exploit. This exploit has been expected since May, when Microsoft took the unusual step of releasing patches for out-of-support product versions alongside a warning that, “it is possible that we won’t see this vulnerability incorporated into malware. But that’s not [...]
One of the unique features of Skybox, and the basis for what we do, is our network model. A network model is often confused with a network map. A network map is a two-dimensional representation of the network. The difference between a model and a map comes down to how well it emulates and represents the network. [...]
There’s a storm brewing for embedded Internet of Things (IoT) and network-attached storage (NAS) devices after the recent discovery of 125 IoT and NAS device vulnerabilities.
Cloud risks increased in the first half of 2019, with cloud container vulnerabilities up 46 percent compared to the same period in 2018
Two new Microsoft wormable vulnerabilities have been identified and patched – both of which share similar DNA with the infamous BlueKeep vulnerability
Skybox recently released its Vulnerability and Threat Trends Report 2019 Mid-Year Update, revealing that only a tenth of vulnerabilities have a developed exploit.