{"id":17478,"date":"2020-01-17T11:00:20","date_gmt":"2020-01-17T19:00:20","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/01\/17\/news-11213\/"},"modified":"2020-01-17T11:00:20","modified_gmt":"2020-01-17T19:00:20","slug":"news-11213","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/17\/news-11213\/","title":{"rendered":"Don\u2019t Let the Vulnera-Bullies Win.  Patch Against Vulnerability CVE-2020-0601 with our Free Tool!"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 17 Jan 2020 17:40:24 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-543348 alignleft\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/logo.png\" alt=\"\" width=\"237\" height=\"87\" \/>So much for a quiet January! By now you must have heard about the new Microsoft\u00ae vulnerability CVE-2020-0601, first disclosed by the NSA (making it the first Windows bug publicly attributed to the National Security Agency). This vulnerability is found in a cryptographic component that has a range of functions\u2014an important one being the ability to digitally sign software, which certifies that the software has not been tampered with. Using this vulnerability, attackers can sign malicious executables to make them look legitimate, leading to potentially disastrous man-in-the-middle attacks.<\/p>\n<p>&nbsp;<\/p>\n<p>Here\u2019s the good news. Microsoft has already released a patch to protect against any exploits stemming from this vulnerability. But here\u2019s the catch: You have to patch!<\/p>\n<p>While Trend Micro offers industry-leading virtual patching capabilities via our endpoint, cloud, and network security solutions, the best protection against vulnerabilities is to deploy a real patch from the software vendor. Let me say it again for effect \u2013 the best protection against this very serious vulnerability is to <strong>ensure the affected systems are patched with Microsoft\u2019s latest security update<\/strong>.<\/p>\n<p>We understand how difficult it can be to patch systems in a timely manner, so we created a valuable tool that will test your endpoints to see if whether they have been patched against this latest threat or if they are still vulnerable. Additionally, to ensure you are protected against any potential threats, we have just released additional layers of protection in the form of IPS rules for Trend Micro Cloud One<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> (formerly Trend Micro<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Deep Security<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>) and Trend Micro<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Vulnerability Protection<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> (including Trend Micro Apex One<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>). This was rolled out to help organizations strengthen their overall security posture and provide some protection during lengthy patching processes.<\/p>\n<p>&nbsp;<\/p>\n<p>You can download our <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/business\/products\/downloads\/CVE20200601Assessment.zip\"><strong>Trend Micro<\/strong> <strong><em>Vulnerability Assessment Tool <\/em><\/strong><\/a>right now to see if you are protected against the latest Microsoft vulnerability. And while you\u2019re at it, check out our latest <a href=\"https:\/\/success.trendmicro.com\/solution\/000237289\"><strong><em>Knowledge Based Article<\/em><\/strong><\/a>\u00a0for additional information on this new vulnerability along with Trend Micro security capabilities that help protect customers like you 24\/7. Even during those quite days in January.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/dont-let-the-vulnera-bullies-win-patch-against-vulnerability-cve-2020-0601-and-do-it-now\/\">Don\u2019t Let the Vulnera-Bullies Win.  Patch Against Vulnerability CVE-2020-0601 with our Free Tool!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/dont-let-the-vulnera-bullies-win-patch-against-vulnerability-cve-2020-0601-and-do-it-now\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 17 Jan 2020 17:40:24 +0000<\/strong><\/p>\n<p>So much for a quiet January! By now you must have heard about the new Microsoft\u00ae vulnerability CVE-2020-0601, first disclosed by the NSA (making it the first Windows bug publicly attributed to the National Security Agency). This vulnerability is found in a cryptographic component that has a range of functions\u2014an important one being the ability&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/dont-let-the-vulnera-bullies-win-patch-against-vulnerability-cve-2020-0601-and-do-it-now\/\">Don\u2019t Let the Vulnera-Bullies Win.  Patch Against Vulnerability CVE-2020-0601 with our Free Tool!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10752],"class_list":["post-17478","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-vulnerabilities"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17478"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17478\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17478"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}