Threat Intelligence

20 02, 2018

Triton Malware Can Remotely Target Critical Infrastructure

By | February 20th, 2018|Threat Intelligence|Comments Off on Triton Malware Can Remotely Target Critical Infrastructure on Triton Malware Can Remotely Target Critical Infrastructure

The highly sophisticated OT malware represents the next evolution of threats to industrial control systems
14 02, 2018

Top Malware in 2018: What to watch for

By | February 14th, 2018|Threat Intelligence|Comments Off on Top Malware in 2018: What to watch for on Top Malware in 2018: What to watch for

Skybox's new Vulnerability and Threat Trends Report lays out the top malware and points to the trend of hybrid, changeling malware
6 02, 2018

North Korea Uses Adobe Flash Zero-Day to Target South

By | February 6th, 2018|Threat Intelligence|Comments Off on North Korea Uses Adobe Flash Zero-Day to Target South on North Korea Uses Adobe Flash Zero-Day to Target South

The Flash Zero-Day has been exploited in the wild since November 2017 targeting South Korea. Patch now available.
3 01, 2018

Intel Vulnerability at Processor Chip Level Will Affect Performance

By | January 3rd, 2018|Threat Intelligence|Comments Off on Intel Vulnerability at Processor Chip Level Will Affect Performance on Intel Vulnerability at Processor Chip Level Will Affect Performance

The Intel vulnerability requires an OS–level patch to Linux, Windows and macOS, slowing down machines by up to 30 percent
20 11, 2017

Terdot Resurrects Zeus Banking Trojan, Bigger and Badder Than Before

By | November 20th, 2017|Threat Intelligence|Comments Off on Terdot Resurrects Zeus Banking Trojan, Bigger and Badder Than Before on Terdot Resurrects Zeus Banking Trojan, Bigger and Badder Than Before

Terdot builds on Zeus’ source code to do more than steal banking credentials, including eavesdrop on social media and email activity
25 10, 2017

Bad Rabbit Relies on Social Engineering, Not Exploits

By | October 25th, 2017|Threat Intelligence|Comments Off on Bad Rabbit Relies on Social Engineering, Not Exploits on Bad Rabbit Relies on Social Engineering, Not Exploits

Unlike WannaCry and Petya/NotPetya before it, the Bad Rabbit ransomware requires user interaction to download and install the payload
17 10, 2017

Adobe Flash Exploit Delivering FINSPY to UN Member Countries

By | October 17th, 2017|Threat Intelligence, Vulnerability & Threat Management|Comments Off on Adobe Flash Exploit Delivering FINSPY to UN Member Countries on Adobe Flash Exploit Delivering FINSPY to UN Member Countries

The BlackOasis threat actor is exploiting an Adobe Flash vulnerability to deliver the FINSPY spyware
15 05, 2017

Does WannaCry Mark a New Era of Global, Distributed Cybercrime?

By | May 15th, 2017|Threat Intelligence|Comments Off on Does WannaCry Mark a New Era of Global, Distributed Cybercrime? on Does WannaCry Mark a New Era of Global, Distributed Cybercrime?

In 2017, the Skybox Security Research Lab predicted a new business model, distributed cybercrime, which it predicted would result in a global malware outbreak. WannaCry was an example of such an outbreak.