A couple of weeks ago, the world woke up to the news of the first BlueKeep exploit. This exploit has been expected since May, when Microsoft took the unusual step of releasing patches for out-of-support product versions alongside a warning that, “it is possible that we won’t see this vulnerability incorporated into malware. But that’s not [...]
One of the unique features of Skybox, and the basis for what we do, is our network model. A network model is often confused with a network map. A network map is a two-dimensional representation of the network. The difference between a model and a map comes down to how well it emulates and represents the network. [...]
There’s a storm brewing for embedded Internet of Things (IoT) and network-attached storage (NAS) devices after the recent discovery of 125 IoT and NAS device vulnerabilities.
Cloud risks increased in the first half of 2019, with cloud container vulnerabilities up 46 percent compared to the same period in 2018
Two new Microsoft wormable vulnerabilities have been identified and patched – both of which share similar DNA with the infamous BlueKeep vulnerability
Skybox recently released its Vulnerability and Threat Trends Report 2019 Mid-Year Update, revealing that only a tenth of vulnerabilities have a developed exploit.
Our Research Lab analyzes the techniques that could have led to Capital One’s breach, leaking more than 100 million records