Search results for: skybox research lab

Need a new search?

If you didn't find what you were looking for, try a new search!

6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab

Skybox's new Vulnerability and Threat Trends Report lays out the vulnerabilities to play a major role in 2018's threat landscape
By | February 7th, 2018|Vulnerability & Threat Management|Comments Off on 6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab on 6 Vulnerabilities to Follow in 2018, According to Skybox Research Lab

Kuwait Oil Company Spreadsheet Delivering OmniRAT to OT Networks

A weaponized Excel file titled “Kuwait Oil Company Business Profile” breathes new life into an old vulnerability, raising concern for unsuspecting OT networks
By | January 30th, 2019|Threat Intelligence|Comments Off on Kuwait Oil Company Spreadsheet Delivering OmniRAT to OT Networks on Kuwait Oil Company Spreadsheet Delivering OmniRAT to OT Networks

Ransomware in India: the SamSam Ransomware and Beyond

Survey shows ransomware in India is prevalent, ranking sixth among countries affected by SamSam — how will they cope?
By | August 15th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware in India: the SamSam Ransomware and Beyond on Ransomware in India: the SamSam Ransomware and Beyond

Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

Report shows malicious cryptominers and ransomware trading places in attack popularity between the last half of 2017 and first half of 2018
By | July 26th, 2018|Vulnerability & Threat Management|Comments Off on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

Ransomware Packs a Punch but Malicious Cryptomining Spikes

While ransomware threats have given some ground to malicious cryptomining, the attacks still hit hard
By | May 9th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware Packs a Punch but Malicious Cryptomining Spikes on Ransomware Packs a Punch but Malicious Cryptomining Spikes

The Cryptomining Malware Family

Cryptomining malware comes in many shapes and sizes, from browser-based software to cryptocurrency wallet stealers and dedicated applications
By | March 29th, 2018|Threat Intelligence|Comments Off on The Cryptomining Malware Family on The Cryptomining Malware Family

Cryptominers More Lucrative, Lower Risk Than Ransomware

What is cryptomining? What makes it malicious? And why is it becoming the darling of cybercriminals?
By | March 28th, 2018|Threat Intelligence|Comments Off on Cryptominers More Lucrative, Lower Risk Than Ransomware on Cryptominers More Lucrative, Lower Risk Than Ransomware

Apple Vulnerability Allows Root Login Without Password

A high–profile Apple vulnerability in MacOS High Sierra allows anyone to login as root without any password
By | November 29th, 2017|Vulnerability & Threat Management|Comments Off on Apple Vulnerability Allows Root Login Without Password on Apple Vulnerability Allows Root Login Without Password

CVEs Abound, But Not Enough to Secure the Enterprise

While MITRE improves catalog methods, it still falls short to improve vulnerability management programs and prioritization to tackle today’s threats.
By | August 4th, 2017|Vulnerability & Threat Management|Comments Off on CVEs Abound, But Not Enough to Secure the Enterprise on CVEs Abound, But Not Enough to Secure the Enterprise