Skybox Blog Team

Skybox Blog Team

About Skybox Blog Team

The Skybox Blog Team is a group of talented, security-conscious writers dedicated to bringing you insights into trending topics, IT security developments, and Skybox solutions. Though you can't see our faces, rest assured: we're all really, really good looking.
23 05, 2018

Speculative Store Buffer Bypass, Rogue System Register Read

By |2018-05-23T17:16:43-07:00May 23rd, 2018|Vulnerability & Threat Management|

Bug bounties pay off, uncovering two more side-channel flaws in the wake of Meltdown and Spectre — Rogue System Register Read and Speculative Store Buffer Bypass. Timeline As soon as Google Project Zero publicized Meltdown and Spectre, researchers started hunting down related flaws. For any hackers not motivated enough by the impact of identifying such a widespread [...]

10 05, 2018

Double Kill Exploit Jumps From MS Office to Internet Explorer

By |2018-05-10T14:57:32-07:00May 10th, 2018|Threat Intelligence|

This week, Microsoft released a patch for the zero-day vulnerability (CVE-2018-8174) — central to the Double Kill exploit — affecting VBScript Engine. In this coordinated release, Qihoo 360 researchers discovered that it was exploited in the wild as early as April 18, 2018, allowing code execution by remote attackers. The vulnerability was used to install [...]

26 04, 2018

Drupalgeddon2 Attack Puts Sites at Risk Worldwide

By |2018-04-26T17:01:53-07:00April 26th, 2018|Threat Intelligence|

Drupal, a popular open-source content management system (CMS) used by more than a million sites worldwide, published yesterday another security advisory rated as highly critical in response to the Drupalgeddon2 attack. This is the third security advisory from Drupal within the last 30 days. Drupalgeddon2 Vulnerability On March 28, Drupal published CVE-2018-7600. Dubbed Drupalgeddon2, the [...]

12 04, 2018

Hackers Disrupt Critical Infrastructure Network Using Cisco Smart Install Flaw

By |2018-04-12T15:29:36-07:00April 12th, 2018|Threat Intelligence, Vulnerability & Threat Management|

During the past week, Cisco’s Smart Install Client tool had been compromised by attackers, causing disruptions of the communication infrastructure of approximately 200,000 Cisco routers worldwide. Cisco’s Smart Install Client is a piece of software which allows customers to deploy new switches remotely with no additional configuration requirements. The vulnerability allows for the misuse of [...]

6 02, 2018

North Korea Uses Adobe Flash Zero-Day to Target South

By |2019-03-08T12:51:50-07:00February 6th, 2018|Threat Intelligence|

On January 31, an Adobe Flash zero-day vulnerability was identified by the South Korea’s KISA (KrCERT/CC). North Korean threat actors were targeting South Korean entities. It was exploited in the wild since as early as November 14, 2017. Today, seven days after the publication of the Flash zero-day, Adobe published APSB18-03 that resolves this issue. Flash Zero-Day [...]

15 06, 2017

EU GDPR is Coming: Are you prepared?

By |2017-10-03T15:51:00-07:00June 15th, 2017|Compliance|

On May 25, 2018, any organization that handles European Union residents’ data must have established processes and procedures compliant with the General Data Protection Regulation (GDPR). Businesses are obligated to implement technical and organizational measures to show data protection has been woven into all their data processing activities. Why should you care about EU GDPR? [...]

15 05, 2017

Does WannaCry Mark a New Era of Global, Distributed Cybercrime?

By |2017-10-04T09:43:35-07:00May 15th, 2017|Threat Intelligence|

It reads like a chapter straight out of Girl With the Dragon Tattoo. WannaCry's estimated impact (so far) is huge: more than 150 countries have been affected, with 200,000 detections showing up across industries, governmental agencies and more. WannaCry spread with lightning speed because it's a combination of ransomware and malware that only needed to be downloaded [...]