Vulnerability & Threat Management

12 02, 2020

Vulnerability and Threat Trends Report 2020: Key Findings

By |2020-02-12T12:04:23-08:00February 12th, 2020|Vulnerability & Threat Management|

The latest edition of Skybox’s Vulnerability and Threat Trends report was released today. The report examines the new vulnerabilities published in 2019, newly developed exploits, new exploit–based malware and attacks, current threat tactics and more. Vulnerabilities do not exist in a vacuum and they cannot be managed in isolation. In order to know what to [...]

21 11, 2019

First BlueKeep Exploit Hits – Have Lessons Been Learned?

By |2019-11-21T14:29:45-08:00November 21st, 2019|Vulnerability & Threat Management|

A couple of weeks ago, the world woke up to the news of the first BlueKeep exploit. This exploit has been expected since May, when Microsoft took the unusual step of releasing patches for out-of-support product versions alongside a warning that, “it is possible that we won’t see this vulnerability incorporated into malware. But that’s not [...]

26 09, 2019

Scores of IoT and NAS Device Vulnerabilities Discovered

By |2019-09-30T12:23:38-07:00September 26th, 2019|Vulnerability & Threat Management|

There’s a storm brewing for embedded Internet of Things (IoT) and network-attached storage (NAS) devices after the recent discovery of 125 IoT and NAS device vulnerabilities.

16 08, 2019

BlueKeep’s Got Company: Two New Microsoft Wormable Vulnerabilities Patched

By |2019-08-16T16:27:26-07:00August 16th, 2019|Threat Intelligence, Vulnerability & Threat Management|

Two new Microsoft wormable vulnerabilities have been identified and patched – both of which share similar DNA with the infamous BlueKeep vulnerability

15 08, 2019

Vulnerability and Threat Trends Report Mid-Year Update: Key Findings

By |2019-08-15T02:44:27-07:00August 15th, 2019|Threat Intelligence, Vulnerability & Threat Management|

Skybox recently released its Vulnerability and Threat Trends Report 2019 Mid-Year Update, revealing that only a tenth of vulnerabilities have a developed exploit.