If you haven’t been following the news, July 5, 2016 is the day that the National Aeronautics and Space Administration (NASA) announced that the Juno spacecraft has finally reached the planet Jupiter. Juno was launched nearly five years ago on a mission to study Jupiter’s evolution and composition. Jupiter is the largest planet in our solar system; it’s basically a huge ball of gas 11 times wider than Earth and 300 times more massive. Researchers think it was the first planet to form and that it holds clues to how the solar system evolved. According to NASA, after a 1.7-billion-mile journey, they hit their burn targets within one second, on a target that was just tens of kilometers large. Juno will circle Jupiter for 20 months and will hopefully help scientists understand the planet’s origins, structure, atmosphere and magnetosphere.
I wish I had five years to finish all the things on my “to-do” list. I’m not discounting the amazing feat that NASA has accomplished, but think about it. If I had five years to find a security vulnerability, I better be able to find out with pinpoint accuracy and amazing performance. We know that our customers don’t have the luxury of time when it comes to protecting their network. They need something that will protect them ASAP! We have the ability to protect our customers from known and unknown attacks with our next-generation IPS and our Advanced Threat Protection solutions. But we’re the only ones who can protect customers from “Known Unknown” attacks. That’s where our Zero Day Initiative (ZDI) comes in. Through the ZDI program, we have access to critical vulnerability information and work with the affected vendor(s) to make sure they have the information they need to work on a patch – all while providing pre-zero-day protection to our customers. As of July 1, the ZDI has over 400 published advisories, with over 200 upcoming. The team is on track to break last year’s record of 666 published advisories! ZDI keeps you in the know without you actually knowing until it’s publicly safe to know, you know?
TippingPoint724 Community Has a New Home!
Trend Micro TippingPoint has transitioned the TippingPoint724 Community Forum to a new home:
All accounts, content and conversations have been migrated. However, due to security concerns, all existing users will be required to reset their account passwords and at the same time acknowledge new Terms and Conditions prior to gaining entry to the community.
For existing users, follow these steps to reset your password:
Missed Last Week’s News?
There are two new zero-day filter covering one vendor in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website.
Hewlett Packard Enterprise (2)
Updated Existing Zero-Day Filters
This section highlights specific filter(s) of interest in this week’s Digital Vaccine package that have been updated as a result of a vendor either issuing a patch for a vulnerability found via the Zero Day Initiative or a vulnerability that has been published by the Zero Day Initiative in accordance with its Disclosure Policy.
Three zero-day filters that were updated this week cover vulnerabilities in Panasonic’s FPWIN Pro application. These vulnerabilities allow remote attackers to execute arbitrary code on vulnerable installations of Panasonic FPWIN Pro.
Panasonic has released FPWIN Pro 7.130 software that addresses these vulnerabilities. Fixed software can be downloaded here.