Newsroom

In the News

US and Australian government warn of critical ...

Security firm RiskIQ has published a report highlighting several critical vulnerabilities in 12 widely used remote access and perimeter devices. The findings show that the rap...

Read More

Social Engineering: A Plague on Crypto and Twi...

“Social engineering is the concept of essentially tricking people into doing something they shouldn’t,” said Yonathan Klijnsma, a threat researcher at the cybersecurity ...

Read More

Critical vulnerabilities found in many popular...

Researchers have identified critical vulnerabilities in a range of popular remote access and perimeter devices, some of which cybercriminals are already abusing.

Identified...

Read More

As election looms, a network of mysterious ‘...

The run-up to the 2020 November elections in the US has produced new networks of shadowy, politically backed “local news websites” designed to promote partisan talking poi...

Read More

Vulnerable perimeter devices: a huge attack su...

In research published today, digital threat management company RiskIQ found hundreds of thousands of fringe network or remote access solutions from Cisco, Microsoft, Citrix, o...

Read More

Security flaws within remote work access devic...

The Vulnerability Landscape report from RiskIQ shows critical security flaws to be present within 12 widely used remote work access and perimeter devices.

Read More

An Amalgamation of Cyber Defense and Ethical H...

According to RiskIQ’s 2019 Evil Internet Minute, cybercrimes cost around $2.9 million dollars to the global economy every minute. This invokes the necessity to secure data, ...

Read More

Twilio exposes SDK, attackers inject it with m...

Twilio today disclosed that its TaskRouter JS SDK was compromised by attackers after they gained access to one of its misconfigured Amazon AWS S3 buckets which left the SDK's p...

Read More

Research Briefing

IBM's X-Force has uncovered information about the operations of ITG18, a threat group the researchers say overlaps with the Iranian threat actors Charming Kitten and Phosphorus...

Read More

Featured On

“ScamNation” Report Profiles Digital Ecosystem Targeting Readers of False, Hyperpartisan News with COVID-19 Subscription Traps

RiskIQ, the global leader in attack surface management, today released a new research report revealing a large-scale digital scam advertisement campaign spread through fraudulent news sites and affiliate ad networks that cater to highly partisan audiences.

Read More
RiskIQ’s Jenna Raby Named Winner as Top 100 Women in Cybersecurity for 2020 at Black Hat USA 2020

RiskIQ, the global leader in attack surface management, today announced Jenna Raby, Senior VP, Global Financial Services and Emerging Markets, has been named a Top 100 Women in Cybersecurity for 2020 by Cyber Defense Magazine, the leading cybersecurity publication in the industry.

Read More
RiskIQ Joins Palo Alto Networks Cortex XSOAR Marketplace as a Launch Partner

RiskIQ’s solutions are powered by its global discovery network and proprietary Internet Intelligence Graph, which, combined, absorb internet data on a massive scale and continuously map the billions of relationships between internet-exposed infrastructure worldwide. RiskIQ is offering three applications in the Cortex XSOAR marketplace based on this data and insights:

Read More
Dangerous Flaws Found in Cisco, Microsoft, Citrix, and IBM Remote Work Access and Perimeter Devices

Recently, organizations have had to scramble to patch dangerous security flaws in dozens of remote access and perimeter devices. Already, there have been 18 high-to-critical vulnerabilities in these systems in 2020. The devices covered in the report include Palo Alto Global Protect, F5 BIG-IP, IBM WebSphere Application Server, Oracle WebLogic, Microsoft Remote Desktop Gateway, Citrix NetScaler Gat...

Read More
RiskIQ Joins Microsoft Intelligent Security Association

RiskIQ's Internet Intelligence Graph absorbs internet data on a massive scale to continuously map the billions of relationships between internet-exposed infrastructure worldwide. When it's combined with enterprise security data analyzed by Azure Sentinel, security operations teams have a full view of their organization's attack surface and unparalleled context around threats and security incidents. ...

Read More