• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Pawan Kinger (Director, Deep Security Labs)

Pawan Kinger

Director, Deep Security Labs

Virtual Patching in the Spotlight Due to Unpatched Microsoft Vulnerabilities

  • Posted on:March 2, 2017
  • Posted in:Exploits, Vulnerabilities
  • Posted by:
    Pawan Kinger (Director, Deep Security Labs)
0

Due to three recently disclosed Microsoft vulnerabilities, the use of Intrusion prevention system (IPS) protection to shield against vulnerabilities (often referred to as Virtual Patching) is back in the spotlight. These allow systems to be protected even if patches have not yet been released by vendors.

Read More
Tags: intrusion prevention systemIPS

How Bad is Badlock (CVE-2016-0128/CVE-2016-2118)?

  • Posted on:April 12, 2016
  • Posted in:Vulnerabilities
  • Posted by:
    Pawan Kinger (Director, Deep Security Labs)
0

News about Badlock vulnerability affecting Windows computers and Samba servers started showing up on Twitter and media around three weeks ago. The site badlock[.]org was registered on March 11 according to WHOIS. There has been a lot of guessing and speculation around this vulnerability. It’s time for reality check: just how bad actually is Badlock?

Named vulnerabilities have resulted in being clichéd very quickly. Being a named vulnerability doesn’t qualify it as a serious widespread vulnerability. Badlock is somewhere in between. In this entry, we demystify the hype of Badlock with questions that measure it as a vulnerability. We also pin it up against a noteworthy case to see how it compares.

Read More
Tags: BadlockCVE-2016-0128CVE-2016-2118MS08-067Vulnerabilities

Trend Micro Continues Protection for Older Versions of Internet Explorer

  • Posted on:January 19, 2016
  • Posted in:Vulnerabilities
  • Posted by:
    Pawan Kinger (Director, Deep Security Labs)
0

Last week, Microsoft ended support for older versions of Internet Explorer (versions 8, 9, and 10). This was done as part of the January 2016 Patch Tuesday cycle; at the same time support for Windows 8 also ended. This means that Microsoft will stop updating old versions of the browser and from now on (with some small exceptions) only systems with the latest IE version (Internet Explorer 11) will receive updates and patches. This poses risks to both end users and enterprises that fail to upgrade to new browser versions.

Read More
Tags: Deep Security and Vulnerability Protectionend of lifeInternet Explorer

Windows Server 2003 End of Life: You Can’t RIP

  • Posted on:June 15, 2015
  • Posted in:Vulnerabilities
  • Posted by:
    Pawan Kinger (Director, Deep Security Labs)
0

Windows XP reached end of support last year and now it’s time for another end of life—Windows Server 2003. On July 14, 2015, this widely deployed Microsoft operating system will reach its end of life—a long run since its launch in April 2003. Estimates on the number of still-active Windows Server 2003 users vary from…

Read More
Tags: end of lifeend of supportWindowsWindows Server 2003

Windows XP – It’s Not Dead Yet

  • Posted on:April 8, 2015
  • Posted in:Vulnerabilities
  • Posted by:
    Pawan Kinger (Director, Deep Security Labs)
0

Support for Windows XP ended over a year ago. By any standard, Windows XP ranks as one of the most influential versions of Windows ever, thanks to its longevity and widespread adoption by enterprises around the world. However, the end of support should have served as a clear signpost to users and organizations to immediately…

Read More
Tags: end of supportWindows Server 2003Windows XP
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.