The Skybox View

7 12, 2018

Zero-Day Attack on Russia Prompts OOB Patches

By | December 7th, 2018|Threat Intelligence|Comments Off on Zero-Day Attack on Russia Prompts OOB Patches on Zero-Day Attack on Russia Prompts OOB Patches

A malicious Word document was used to exploit an Abobe Flash Player bug in a targeted zero-day attack on Russia
8 11, 2018

Bleedingbit Vulnerabilities Could Affect Enterprises Worldwide

By | November 8th, 2018|Vulnerability & Threat Management|Comments Off on Bleedingbit Vulnerabilities Could Affect Enterprises Worldwide on Bleedingbit Vulnerabilities Could Affect Enterprises Worldwide

The Bleedingbit vulnerabilities impact Bluetooth low-energy chips used in millions of wireless access points
16 10, 2018

Foreshadow Vulnerabilities Impact Siemens Products

By | October 16th, 2018|Vulnerability & Threat Management|Comments Off on Foreshadow Vulnerabilities Impact Siemens Products on Foreshadow Vulnerabilities Impact Siemens Products

Foreshadow, or L1 terminal fault vulnerabilities, in various Siemens industrial products could put the most isolated and secure microprocessor memory at risk
8 10, 2018

TSMC WannaCry Hits OT Plants with a Hefty Price Tag

By | October 8th, 2018|Uncategorized, Vulnerability & Threat Management|Comments Off on TSMC WannaCry Hits OT Plants with a Hefty Price Tag on TSMC WannaCry Hits OT Plants with a Hefty Price Tag

The TSMC WannaCry attack is yet another reminder in the constant vigilance of vulnerability management — and the effect it can have on your bottom line
10 09, 2018

Android API Vulnerability Exposes Sensitive Customer Information

By | September 10th, 2018|Vulnerability & Threat Management|Comments Off on Android API Vulnerability Exposes Sensitive Customer Information on Android API Vulnerability Exposes Sensitive Customer Information

Attackers could use the Android API vulnerability to physically locate a user, track their online activity or target them with ads
27 08, 2018

Security Automation: Can it Fix What Ails Enterprises Cybersecurity Programs?

By | August 27th, 2018|Security Automation|Comments Off on Security Automation: Can it Fix What Ails Enterprises Cybersecurity Programs? on Security Automation: Can it Fix What Ails Enterprises Cybersecurity Programs?

New security automation survey reveals many organizations struggling with core security issues, yet automation initiatives driven by cost-cutting concerns
21 08, 2018

MikroTik Routers Infected in Mass-Scale Coinhive Cryptojacking Campaign

By | August 21st, 2018|Threat Intelligence|Comments Off on MikroTik Routers Infected in Mass-Scale Coinhive Cryptojacking Campaign on MikroTik Routers Infected in Mass-Scale Coinhive Cryptojacking Campaign

More than 200,000 MikroTik routers have been infected worldwide, an upgrade to the firmware is available
15 08, 2018

Ransomware in India: the SamSam Ransomware and Beyond

By | August 15th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware in India: the SamSam Ransomware and Beyond on Ransomware in India: the SamSam Ransomware and Beyond

Survey shows ransomware in India is prevalent, ranking sixth among countries affected by SamSam — how will they cope?
27 07, 2018

Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks

By | July 27th, 2018|Threat Intelligence|Comments Off on Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks on Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks

A recently published Oracle WebLogic vulnerability has been exploited in large-scale campaigns, many to mine cryptocurrency for the attackers such as Iuoxk Group
26 07, 2018

Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

By | July 26th, 2018|Vulnerability & Threat Management|Comments Off on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

Report shows malicious cryptominers and ransomware trading places in attack popularity between the last half of 2017 and first half of 2018