Marina Kidron

Marina Kidron

About Marina Kidron

Marina Kidron is Skybox Security's director of threat intelligence and leader of the Skybox Research Lab, a dedicated team of analysts who daily scour dozens of security feeds and sources and investigate sites in the dark web. Kidron has more than 10 years of experience in business and statistical data analysis, data modeling and algorithms development for information technology, mobile and internet companies and financial services companies. She earned a Master's degree in Political Marketing, and a Bachelor degree in Computer Science and Mathematics.
3 07, 2018

Cisco ASA Vulnerabilities See POC and Active Exploits

By |2018-07-03T13:44:31-07:00July 3rd, 2018|Uncategorized, Vulnerability & Threat Management|

A vulnerability recently surfaced in Cisco ASA, affecting Cisco Firepower and other Cisco devices. Exploiting the vulnerability (CVE-2018-0296) could cause an affected device to reload unexpectedly, allowing remote denial-of-service or information disclosure due to a path transversal issue. The vulnerability exists at the web interface and applies to IPv4 and IPv6 traffic. It does not [...]

7 05, 2018

How Will NHS Windows 10 Upgrade Impact Risk?

By |2018-05-08T13:47:05-07:00May 7th, 2018|Vulnerability & Threat Management|

The NHS Windows 10 upgrade is likely a response to the crippling WannaCry attack of May 2017, which affected more than a third of English trusts and forced the cancellation of at least 6,912 appointments. According to the BBC, NHS Digital had assessed the cybersecurity standards of 88 out of 236 trusts prior to the [...]

27 04, 2018

Orangeworm and Abbott Shed Light on Healthcare Cyberthreat

By |2019-03-08T12:52:30-07:00April 27th, 2018|Healthcare|

Orangeworm On April 23, Symantec published a report on the Orangeworm cyberattack. Operating since January 2015, Orangeworm infected more than 100 organizations of which 40 percent are confirmed to be at the healthcare sector, mostly located in the United States, Europe and Asia. Other affected organizations are supply chain, IT, pharmaceutical and manufacturing companies working with [...]

14 03, 2018

March Patch Tuesday and AMD Processor Vulnerability

By |2018-04-03T11:34:57-07:00March 14th, 2018|Patch Tuesday|

CredSSP Vulnerability Main Focus of March Patch Tuesday For March Patch Tuesday, Microsoft announced 74 CVEs. But one deserves special attention. A remote code execution (RCE) vulnerability in Microsoft’s Credential Security Support Provider (CredSSP) protocol allows a remote attacker to leverage a man-in-the-middle attack to execute arbitrary code on a different machine in the attacked network. [...]

20 02, 2018

Triton Malware Can Remotely Target Critical Infrastructure

By |2018-02-20T13:46:44-07:00February 20th, 2018|Threat Intelligence|

Triton malware (aka TRISIS) has joined the limited list of publicly identified malware targeted at operational technology (OT) networks. Other occupants of this small-but-mighty category include Stuxnet (2010), Shamoon (2012), Shamoon 2 (2016) and Industroyer (2016). In August of 2017, the Triton malware was observed to be targeting Schneider Electric’s Triconex safety instrumented system (SIS) [...]

4 01, 2018

Meltdown, Spectre Reach Beyond Intel as Vendors Release Patches

By |2018-01-04T12:52:49-07:00January 4th, 2018|Vulnerability & Threat Management|

What was yesterday’s Intel kerfuffle is now showing how wide a CPU design flaw stretches. In addition to Intel, microprocessors from AMD and Arm are also vulnerable to multiple information disclosure vulnerabilities. The flaws affect almost every CPU released since 1995, according to Google’s Project Zero. The Meltdown and Spectre hardware bugs allow normal user [...]