{"id":7087,"date":"2017-03-23T06:00:02","date_gmt":"2017-03-23T14:00:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/23\/news-878\/"},"modified":"2017-03-23T06:00:02","modified_gmt":"2017-03-23T14:00:02","slug":"news-878","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/23\/news-878\/","title":{"rendered":"2016 Review of Vulnerabilities"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Thu, 23 Mar 2017 13:00:45 +0000<\/strong><\/p>\n<p>In our 2016 security roundup report, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/2016-roundup-record-year-enterprise-threats\">A Record Year for Enterprise Threats<\/a>, we talked about the vulnerability landscape during the year and what trends we saw.<\/p>\n<p>Let\u2019s look at some of the key aspects of what we saw in 2016.<\/p>\n<p>1. Trend Micro\u2019s Zero Day Initiative (ZDI) with support of their 3,000+ independent vulnerability researchers, discovered and responsibly disclosed 678 vulnerabilities in 2016. There were some interesting trends, as can be seen in the figures below:<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-538838 \" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-1024x601.jpg\" alt=\"\" width=\"609\" height=\"357\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-1024x601.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-300x176.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-768x451.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-640x376.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-900x528.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-440x258.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog-380x223.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog.jpg 1348w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>First is that Microsoft has continued to minimize the number of vulnerabilities within their products over time. That\u2019s good news, but the not so good news for Microsoft was the 2,100 percent increase in Edge vulnerabilities.\u00a0This was further supported at <a href=\"http:\/\/blog.trendmicro.com\/results-pwn2own-2017-day-two\/\">Pwn2Own 2017<\/a>, as Edge was the most exploited browser in the contest.<\/li>\n<li>Second was a drop in overall Adobe vulnerabilities, but Acrobat Reader was the second in having the most vulnerabilities disclosed for 2016.<\/li>\n<li>0-Days, which are vulnerabilities that had active attacks associated with them prior to a patch being released, were down in 2016 from 2015. That is good news but we also saw recently with the hack of the CIA that there are likely many 0Days out there that have not been disclosed.<\/li>\n<li>Android saw a large increase (206 percent) in the number of vulnerabilities disclosed for them. Trend Micro researchers submitted 54 vulnerabilities to Google for Android in 2016.<\/li>\n<li>A 421 percent increase in SCADA vulnerabilities were disclosed in 2016 which isn\u2019t boding well for these manufacturers due\u00a0to the challenges with managing updates to these devices.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>2. Within the exploit kit market we saw a number of changes take place. The Angler exploit kit ceased operations after a number of actors were arrested in Russia. Neutrino tried to take its place but that appeared to be fleeting as can be seen in the chart below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-538839 size-large\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-1024x497.jpg\" alt=\"\" width=\"1024\" height=\"497\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-1024x497.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-300x146.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-768x373.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-640x311.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-900x437.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-440x214.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1-380x185.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/blog1.jpg 1108w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>3. We also saw a decrease in the number of new vulnerabilities being added to exploit kits in 2016, which does not necessarily mean exploit kits are less effective. We regularly see older vulnerabilities used within exploit kits because these still appear to be working to compromise systems. What we did see occur in 2016 was a higher use of ransomware being used within exploit kits as the primary infection option.<\/p>\n<p>While we saw both increases and decreases in the number of vulnerabilities from respective vendors, what is true is that threat actors will continue to utilize exploits to infect their victims.\u00a0 People and organizations should not assume that because we saw some decreases that they can take longer times to patch their systems.\u00a0 Patch management is as critical today as ever before and the use of virtual patching can be used to allow more time to manage the patch from the vendor.<\/p>\n<p>In the cases where ZDI managed the disclosure process, they were able to protect TippingPoint NGIPS customers on average 57 days prior to the vendor\u2019s release of their patch.<\/p>\n<p>Trend Micro also offers virtual patching within our <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/deep-security-data-center.html\">Deep Security<\/a>, <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/deep-discovery.html\">Deep Discovery<\/a>, and <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/endpoint\/vulnerability-protection.html\">Vulnerability Protection<\/a> solutions.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/2016-review-vulnerabilities\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Thu, 23 Mar 2017 13:00:45 +0000<\/strong><\/p>\n<p>In our 2016 security roundup report, A Record Year for Enterprise Threats, we talked about the vulnerability landscape during the year and what trends we saw. Let\u2019s look at some of the key aspects of what we saw in 2016. 1. Trend Micro\u2019s Zero Day Initiative (ZDI) with support of their 3,000+ independent vulnerability researchers,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[714,10752],"class_list":["post-7087","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-security","tag-vulnerabilities"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7087"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7087\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7087"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}