Skip to content
Contact Sales

Skybox Research Lab

The Skybox Threat Intelligence Division

At the forefront in analyzing the latest cyber vulnerabilities and threats for over a decade, the lab delivers comprehensive, actionable, and timely threat intelligence that powers Skybox’s Vulnerability and Threat Management solution, and enables our customers to discover, prioritize and remediate risks. Our team of analysts continuously monitors dozens of security sources, tracking and analyzing tens of thousands of vulnerabilities on thousands of products, along with the latest data on exploits and malware taking advantage of these vulnerabilities.

Articles by Skybox Research Lab

January 29, 2024
Ivanti VPN vulnerability: How to defend against CVE-2023-46805, CVE-2024-21887

Two zero-day vulnerabilities, CVE-2023-46805 and CVE-2024-21887, were recently discovered on the Ivanti VPNs. Learn how you can mitigate your risk.

January 24, 2024
Three critical flaws with today’s vulnerability management solutions

More needs to be done to prevent vulnerability exploits.

January 18, 2024
What’s new with CVSS 4.0: Four thoughts on its impact on Vulnerability and Threat Management

Long overdue, the new CVSS 4.0 scoring model was released in November, 2023. Skybox participated in the development of the latest version. Here are our four...

January 10, 2024
Think like a cybercriminal to reduce cyber exposure

Known vulnerabilities and security gaps give adversaries easy access to your organization. Strengthen your security posture. Shut the door on cyber risk.

November 28, 2022
First cybersecurity solution that connects Vulnerability Management with Threat Hunting

Skybox maps vulnerabilities to malware by name, category, and distinct classes – ransomware, Remote Access Trojans, botnets, cryptocurrency miners, trojans, and more.

November 16, 2022
Cybersecurity product consolidation: Skybox customers save 50% by consolidating redundant or unnecessary tools

Forrester Study shows how Skybox customers decommission unnecessary vulnerability, firewall, network policy management, reporting, and analytics toolsets.

July 15, 2022
Endemic vulnerabilities: 3 ways to mitigate Log4j exposure

Overcome Log4j patching fatigue with threat intelligence and attack path analysis. Focus on top 1% of exposures and surgically prioritize risk reduction.

July 19, 2021
3 trends shaping security posture management for 2021

Explore emerging vulnerability and threat trends. Learn how to prioritize critical vulnerabilities, close the remediation gap, and validate security posture.