{"id":11774,"date":"2018-03-16T08:00:05","date_gmt":"2018-03-16T16:00:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/16\/news-5544\/"},"modified":"2018-03-16T08:00:05","modified_gmt":"2018-03-16T16:00:05","slug":"news-5544","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/16\/news-5544\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of March 12, 2018"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 16 Mar 2018 15:14:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>This week marked the 11<sup>th<\/sup> annual Pwn2Own contest held during the CanSecWest conference in Vancouver and while the contest had fewer entries compared to previous years, it was still an exciting event filled with a little drama. Over the course of two days, the Zero Day Initiative awarded $267,000 for vulnerabilities covering Apple (5), Microsoft (4), Oracle (2) and Mozilla (1) and named a new Master of Pwn: Richard Zhu (<a href=\"https:\/\/twitter.com\/rz_fluorescence\">fluorescence<\/a>). Congratulations go out to Richard and all of the other contestants, with a special thank you to our partner Microsoft and sponsor VMware. For a sneak peek of our upcoming coverage, <a href=\"https:\/\/blog.trendmicro.com\/a-view-of-upcoming-threat-coverage-from-pwn2own-2018\/\">click here<\/a>. You can also catch up on the results of each day at the following links below:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/3\/14\/pwn2own-2018-results-from-day-one\">PWN2OWN 2018 \u2013 Results from Day 1<\/a><\/li>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/3\/15\/pwn2own-2018-day-two-results-and-master-of-pwn\">PWN2OWN 2018 \u2013 Day Two Results and Master of Pwn<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Microsoft Security Updates<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine\u00ae (DV) package includes coverage for Microsoft updates released on or before March 13, 2018. Just a day before the Pwn2Own contest, Microsoft released 75 security patches covering Internet Explorer (IE), Edge, ChakraCore, Microsoft Windows, Microsoft Office, and ASP.NET Core. The following table maps Digital Vaccine filters to the Microsoft updates. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/3\/13\/the-march-2018-security-update-review\">March 2018 Security Update Review<\/a> from the Zero Day Initiative:<\/p>\n<div class=\"lightTable\">\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"126\"><strong>CVE #<\/strong><\/td>\n<td width=\"162\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"348\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0787<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0808<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0811<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0813<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0814<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0815<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0816<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0817<\/td>\n<td width=\"162\">30687<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0868<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0872<\/td>\n<td width=\"162\">30553<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0873<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0874<\/td>\n<td width=\"162\">30555<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0875<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0876<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0877<\/td>\n<td width=\"162\">30689<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0878<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0879<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0880<\/td>\n<td width=\"162\">30690<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0881<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0882<\/td>\n<td width=\"162\">30691<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0883<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0884<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0885<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0886<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0888<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0889<\/td>\n<td width=\"162\">30514<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0891<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0893<\/td>\n<td width=\"162\">30517<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0894<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0895<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0896<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0897<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0898<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0899<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0900<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0901<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0902<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0903<\/td>\n<td width=\"162\">30688<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0904<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0907<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0909<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0910<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0911<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0912<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0913<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0914<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0915<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0916<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0917<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0919<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0921<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0922<\/td>\n<td width=\"162\">30554<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0923<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0924<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0925<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0926<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0927<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0929<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0930<\/td>\n<td width=\"162\">30547<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0931<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0932<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0933<\/td>\n<td width=\"162\">30508<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0934<\/td>\n<td width=\"162\">30509<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0935<\/td>\n<td width=\"162\">30552<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0936<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0937<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0939<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0940<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0941<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0942<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0944<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0947<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0977<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0983<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are four new zero-day filters covering four vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Advantech (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30693: ZDI-CAN-5519: Zero Day Initiative Vulnerability (Advantech WebAccess Node)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>EMC (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30433: HTTP: EMC Unisphere For VMAX vApp Manager ORBServlet Authentication Bypass (ZDI-17-919)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>GE (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30692: ZDI-CAN-5518: Zero Day Initiative Vulnerability (GE MDS PulseNET)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Microsoft (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30549: ZDI-CAN-5499: Zero Day Initiative Vulnerability (Microsoft Chakra)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-march-5-2018\/\">weekly recap<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-march-12-2018\/\">TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of March 12, 2018<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-march-12-2018\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 16 Mar 2018 15:14:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>This week marked the 11th annual Pwn2Own contest held during the CanSecWest conference in Vancouver and while the contest had fewer entries compared to previous years, it was still an exciting event filled with a little drama. Over the course of two days, the Zero Day Initiative awarded $267,000 for vulnerabilities covering Apple (5), Microsoft&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-march-12-2018\/\">TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of March 12, 2018<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-11774","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11774"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11774\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}