Search results for: skybox research lab

Need a new search?

If you didn't find what you were looking for, try a new search!

6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab

The new Vulnerability and Threat Trends Report released today by the Skybox Research Lab includes security analyst research of the vulnerabilities, exploits and threats that are shaping the threat landscape. The report outlines the top six vulnerabilities to follow in 2018 amid the 14,000 new vulnerabilities catalogued by MITRE’s National Vulnerability Database the previous year. [...]

By |2018-02-14T13:48:11-07:00February 7th, 2018|Vulnerability & Threat Management|Comments Off on 6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab

Ransomware in India: the SamSam Ransomware and Beyond

A Sophos survey shed light on the state of ransomware in India. It revealed that 67 percent of Indian respondents reported being hit by ransomware in the last year. Due to a number of factors, it’s likely Indian business will see an increase in cyberattacks in the near future. SamSam ransomware could be one of [...]

By |2018-08-15T12:52:48-07:00August 15th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware in India: the SamSam Ransomware and Beyond

Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

Cryptominers have surpassed ransomware as the cybercriminal’s tool-of-choice in the first half of 2018. That’s according to the mid-year update to the Vulnerability and Threat Trends Report. The report is compiled by the Skybox Research Lab and includes security analyst research of the vulnerabilities, exploits and threats that are shaping the threat landscape. It explores trends observed [...]

By |2018-07-26T14:31:09-07:00July 26th, 2018|Vulnerability & Threat Management|Comments Off on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

Ransomware Packs a Punch but Malicious Cryptomining Spikes

The last few years have seen ransomware attacks capture global headlines for the widespread and brazen tactics used to install and hold victim's data hostage. As recently as March of 2018, WannaCry reared its head again at a US-based Boeing manufacturing plant, and SamSam striking the city of Atlanta, one of the country’s largest municipalities. [...]

By |2018-05-10T15:24:25-07:00May 9th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware Packs a Punch but Malicious Cryptomining Spikes

The Cryptomining Malware Family

Cryptominers have become their own class of malware, growing in popularity as a low-risk, high-reward way for cybercriminals to make an easy crypto-buck. In this post, we’ll look at the members of the cryptomining malware family and their techniques. Browser-Based Cryptomining Software CoinHive, Crypto-Loot and JSEcoin allow website owners to legitimately monetize website traffic. Favoring [...]

By |2018-03-29T11:54:39-07:00March 29th, 2018|Threat Intelligence|Comments Off on The Cryptomining Malware Family

Cryptominers More Lucrative, Lower Risk Than Ransomware

If 2017 was the year of high-profile data breaches and ransomware attacks, 2018 seems to be the year of cryptocurrency-related malware. Cryptominers managed to impact 23 percent of organizations globally. Cryptomining is relatively new, and not all of it is purely malicious. Some cryptominers are considered to be legitimate techniques to gain cryptocurrency, akin to [...]

By |2018-03-29T11:56:41-07:00March 28th, 2018|Threat Intelligence|Comments Off on Cryptominers More Lucrative, Lower Risk Than Ransomware

Apple Vulnerability Allows Root Login Without Password

A high–profile Apple vulnerability in High Sierra allows anyone to login as root without providing any password. Apple has released an update to address the flaw in it’s MacOS X 10.13; if you’re unable to update, set a root password for devices running the operating system. The vulnerability is trivial to exploit. Simply enter the [...]

By |2017-11-29T12:25:38-07:00November 29th, 2017|Vulnerability & Threat Management|Comments Off on Apple Vulnerability Allows Root Login Without Password

CVEs Abound, But Not Enough to Secure the Enterprise

A recent article by Taylor Armerding of CSO Online explores the current state of the Common Vulnerabilities and Exposures (CVE) program managed by MITRE (read about the origins of CVE and MITRE here). He expands on the creeping belief that the CVE, the old–guard vulnerability “dictionary,” is falling behind and leaving security teams and technologies [...]

By |2018-02-05T11:44:18-07:00August 4th, 2017|Vulnerability & Threat Management|Comments Off on CVEs Abound, But Not Enough to Secure the Enterprise