{"id":8799,"date":"2017-08-18T05:00:02","date_gmt":"2017-08-18T13:00:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/18\/news-2572\/"},"modified":"2017-08-18T05:00:02","modified_gmt":"2017-08-18T13:00:02","slug":"news-2572","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/08\/18\/news-2572\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of August 14, 2017"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 18 Aug 2017 12:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>One of my favorite movies is the 1999 comedy \u201cGalaxy Quest,\u201d which features the cast of a science-fiction television series similar to Star Trek. In the movie, the crew is visited by real aliens who ask them for help against an intergalactic adversary because they believe that Galaxy Quest is a documentary of historical documents \u2013 not a TV show. There\u2019s a scene in the movie where someone pressed the button that destroys the ship. The crew makes it to the center of the ship where they can stop the process but the stop button doesn\u2019t work. The countdown to destruction continues, but when the clock hits one second, it stops. Why? Because on a TV show, the clock always stops at one second before total destruction.<\/p>\n<p>Sometimes, we can\u2019t control the script of our real-life security world and the clock doesn\u2019t stop at one second. Yesterday, the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> (ZDI) published two zero-day advisories for vulnerabilities in Foxit Reader per the guidelines outlined in the ZDI disclosure policy. The two advisories, <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/ZDI-17-691\/\">ZDI-17-691<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/ZDI-17-692\/\">ZDI-17-692<\/a>, allow remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. For more detailed analysis of the Foxit Reader vulnerabilities, you can read the ZDI blog: <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/8\/17\/busting-myths-in-foxit-reader\">Busting Myths in Foxit Reader<\/a>.<\/p>\n<p><strong>Adobe Security Update<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine (DV) package includes coverage for Adobe updates released on or before August 8, 2017. The following table maps Digital Vaccine filters to the Adobe updates. Filters marked with an (*) shipped prior to this week\u2019s DV package, providing zero-day protection for our customers. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/8\/8\/the-august-2017-security-update-review\">August 2017 Security Update Review<\/a> from the Zero Day Initiative:<\/p>\n<div class=\"lightTable\">\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"111\"><strong>Bulletin #<\/strong><\/td>\n<td width=\"128\"><strong>CVE #<\/strong><\/td>\n<td width=\"152\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"234\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-23<\/td>\n<td width=\"128\">CVE-2017-3085<\/td>\n<td width=\"152\"><\/td>\n<td width=\"234\">Local Only<\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-23<\/td>\n<td width=\"128\">CVE-2017-3106<\/td>\n<td width=\"152\">29353<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3113<\/td>\n<td width=\"152\">*26537<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3115<\/td>\n<td width=\"152\">*27233<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3116<\/td>\n<td width=\"152\">29354<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3117<\/td>\n<td width=\"152\"><\/td>\n<td width=\"234\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3118<\/td>\n<td width=\"152\">29358<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3119<\/td>\n<td width=\"152\">29359<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3120<\/td>\n<td width=\"152\">*27751<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3121<\/td>\n<td width=\"152\">*27948<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3122<\/td>\n<td width=\"152\">*28005<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3123<\/td>\n<td width=\"152\">*28032<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-3124<\/td>\n<td width=\"152\">*28034<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11209<\/td>\n<td width=\"152\">*28035<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11210<\/td>\n<td width=\"152\">*28092<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11211<\/td>\n<td width=\"152\">*28218<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11212<\/td>\n<td width=\"152\">*28100<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11214<\/td>\n<td width=\"152\">*28216<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11216<\/td>\n<td width=\"152\">*27821<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11217<\/td>\n<td width=\"152\">*27812<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11218<\/td>\n<td width=\"152\">*27753<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11219<\/td>\n<td width=\"152\">*27820<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11220<\/td>\n<td width=\"152\">29360<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11221<\/td>\n<td width=\"152\">29413<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11222<\/td>\n<td width=\"152\">29352<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11223<\/td>\n<td width=\"152\">*28202<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11224<\/td>\n<td width=\"152\">*28202<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11226<\/td>\n<td width=\"152\">29349<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11227<\/td>\n<td width=\"152\">*28473<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11228<\/td>\n<td width=\"152\">*28475<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11229<\/td>\n<td width=\"152\">29361<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11230<\/td>\n<td width=\"152\">*28476<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11231<\/td>\n<td width=\"152\">*28478<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11232<\/td>\n<td width=\"152\">*28479<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11233<\/td>\n<td width=\"152\">*28481<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11234<\/td>\n<td width=\"152\">*28543<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11235<\/td>\n<td width=\"152\">29362<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11236<\/td>\n<td width=\"152\">29363<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11237<\/td>\n<td width=\"152\">29370<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11238<\/td>\n<td width=\"152\">29371<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11239<\/td>\n<td width=\"152\">*28544<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11241<\/td>\n<td width=\"152\">*28547<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11242<\/td>\n<td width=\"152\">28480, 28548<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11243<\/td>\n<td width=\"152\">*28663<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11244<\/td>\n<td width=\"152\">*28664<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11245<\/td>\n<td width=\"152\">*28666<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11246<\/td>\n<td width=\"152\">29414<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11248<\/td>\n<td width=\"152\">*28463<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11249<\/td>\n<td width=\"152\">*28464<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11251<\/td>\n<td width=\"152\">29418<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11252<\/td>\n<td width=\"152\">*28477<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11254<\/td>\n<td width=\"152\">29350<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11255<\/td>\n<td width=\"152\">*28741<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11256<\/td>\n<td width=\"152\">*28735<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11257<\/td>\n<td width=\"152\">*28734<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11258<\/td>\n<td width=\"152\">*28732<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11259<\/td>\n<td width=\"152\">*28733<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11260<\/td>\n<td width=\"152\">*28731<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11261<\/td>\n<td width=\"152\">*28730<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11262<\/td>\n<td width=\"152\">29355<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11263<\/td>\n<td width=\"152\">29369<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11265<\/td>\n<td width=\"152\">*28916<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11267<\/td>\n<td width=\"152\">29364<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11268<\/td>\n<td width=\"152\">29365<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11269<\/td>\n<td width=\"152\">29366<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11270<\/td>\n<td width=\"152\">29367<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<tr>\n<td width=\"111\">APSB17-24<\/td>\n<td width=\"128\">CVE-2017-11271<\/td>\n<td width=\"152\">29368<\/td>\n<td width=\"234\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p><strong>TippingPoint Operating System (TOS) v3.9.2 Release<\/strong><\/p>\n<p>Earlier this week, we issued a maintenance release version 3.9.2 build 4784 of the TippingPoint Operating System (TOS) for the N\/NX Platform family. For the complete list of enhancements and changes, please refer to the product Release Notes located on the Threat Management center (TMC) Web site at <a href=\"https:\/\/tmc.tippingpoint.com\">https:\/\/tmc.tippingpoint.com<\/a>. Customers with questions or technical assistance can contact the TippingPoint Technical Assistance Center (TAC).<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 14 new zero-day filters covering two vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website.<\/p>\n<p><strong><em>Adobe (11)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>29362: HTTP: Adobe Acrobat Pro DC ImageConversion JPEG Use-After-Free Vulnerability (ZDI-17-590)<\/li>\n<li>29363: HTTP: Adobe Acrobat Pro DC Forms Information Disclosure Vulnerability (ZDI-17-591)<\/li>\n<li>29364: HTTP: Adobe Acrobat Pro DC ImageConversion Memory Corruption Vulnerability (ZDI-17-621)<\/li>\n<li>29365: HTTP: Adobe Acrobat Pro DC ImageConversion Information Disclosure Vulnerability (ZDI-17-622)<\/li>\n<li>29366: HTTP: Adobe Acrobat Pro DC ImageConversion Information Disclosure Vulnerability (ZDI-17-623)<\/li>\n<li>29367: HTTP: Adobe Acrobat Pro DC ImageConversion Information Disclosure Vulnerability (ZDI-17-625)<\/li>\n<li>29368: HTTP: Adobe Acrobat Pro DC ImageConversion Memory Corruption Vulnerability (ZDI-17-629)<\/li>\n<li>29370: HTTP: Adobe Acrobat Pro DC Font Parsing Information Disclosure Vulnerability (ZDI-17-592)<\/li>\n<li>29371: HTTP: Adobe Acrobat Pro DC ImageConversion EMF Information Disclosure Vulnerability (ZDI-17-593)<\/li>\n<li>29414: HTTP: Adobe Acrobat Pro ImageConversion JPEG Information Disclosure Vulnerability (ZDI-17-603)<\/li>\n<li>29418: HTTP: Adobe Acrobat Pro DC JPEG2000 Memory Corruption Vulnerability (ZDI-17-609)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>\u00a0<\/em><\/strong><\/p>\n<p><strong><em>Trend Micro (3)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>29333: HTTPS: Trend Micro SafeSync for Enterprise replace_local_disk Command Injection (ZDI-17-119)<\/li>\n<li>29337: HTTP: Trend Micro SafeSync for Enterprise dead_local_disk Command Injection (ZDI-17-118)<\/li>\n<li>29338: HTTPS: Trend Micro SafeSync for Enterprise dead_local_disk Command Injection (ZDI-17-118)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-august-7-2017\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-august-14-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 18 Aug 2017 12:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>One of my favorite movies is the 1999 comedy \u201cGalaxy Quest,\u201d which features the cast of a science-fiction television series similar to Star Trek. In the movie, the crew is visited by real aliens who ask them for help against an intergalactic adversary because they believe that Galaxy Quest is a documentary of historical documents&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-8799","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8799"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8799\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}