One of the unique features of Skybox, and the basis for what we do, is our network model. A network model is often confused with a network map. A network map is a two-dimensional representation of the network. The difference between a model and a map comes down to how well it emulates and represents the network. [...]
There’s a storm brewing for embedded Internet of Things (IoT) and network-attached storage (NAS) devices after the recent discovery of 125 IoT and NAS device vulnerabilities.
Cloud risks increased in the first half of 2019, with cloud container vulnerabilities up 46 percent compared to the same period in 2018
Two new Microsoft wormable vulnerabilities have been identified and patched – both of which share similar DNA with the infamous BlueKeep vulnerability
Skybox recently released its Vulnerability and Threat Trends Report 2019 Mid-Year Update, revealing that only a tenth of vulnerabilities have a developed exploit.
Our Research Lab analyzes the techniques that could have led to Capital One’s breach, leaking more than 100 million records
A critical Palo Alto Networks RCE vulnerability has been discovered and patched. If exploited, attackers could gain control of your internet gateway and firewall rules