{"id":2126,"date":"2018-06-01T14:08:40","date_gmt":"2018-06-01T14:08:40","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541409"},"modified":"2018-06-01T14:08:40","modified_gmt":"2018-06-01T14:08:40","slug":"tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018"},"content":{"rendered":"<div class=\"post-text\" readability=\"69.389027431421\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>I ended up at an urgent care clinic earlier this week and found out I have strep throat. The doctor who examined me asked me what medicine I had taken prior to my visit to help alleviate my throat pain, to which I replied, \u201cI took a multi-symptom liquid medicine because the pain was keeping me awake.\u201d To my amazement, he said, \u201cYou\u2019re over 21 years old, right? You would have been better off with some good alcohol and ibuprofen because what you took is the same thing.\u201d I thought he was joking (he wasn\u2019t), but while I didn\u2019t know what I had at the time, I was just looking for the quick fix for lack of sleep and throat pain, realizing I wasn\u2019t solving the root issue that would end up being a bacterial infection.<\/p>\n<p>Speaking of diagnosing a root cause, Zero Day Initiative (ZDI) vulnerability researcher Abdul-Aziz Hariri published a blog this week detailing a buffer overflow vulnerability in Adobe Acrobat. ZDI has seen an increase in Adobe vulnerability submissions in the past couple of years, especially in the Acrobat Reader product line. Abdul-Aziz explores the root cause of the buffer overflow that affected the setIntent Optional Content Groups (OCG) JavaScript function. JavaScript is an attractive hotbed for attackers and the JavaScript engine within Acrobat is no exception. You can read the full blog <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/5\/29\/malicious-intent-using-adobe-acrobats-ocg-setintent\">here<\/a> to learn how Adobe tried to patch the vulnerability, only to be faced with a patch evasion within hours, and how they eventually corrected the issue.<\/p>\n<p><strong>Microsoft Zero-Day Published<\/strong><\/p>\n<p>Earlier this week, the ZDI published details of a Microsoft Windows vulnerability in accordance with its <a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/disclosure_policy\/\">disclosure policy<\/a>. The flaw exists in Windows\u2019 JScript component that can allow an attacker to execute malicious code on vulnerable systems. More specifically, the flaw exists within the handling of Error objects in JScript. According to ZDI, Microsoft is working on a patch, and at the time of this blog posting, no known exploits exist. You can get more details on the vulnerability <a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-18-534\/\">here<\/a>.<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 17 new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Adobe (8)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"2.5\">\n<tr readability=\"5\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>31858: ZDI-CAN-5967: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>31859: ZDI-CAN-5968: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>31865: ZDI-CAN-6153: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>31868: ZDI-CAN-5706: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>31871: ZDI-CAN-5708: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>31872: ZDI-CAN-5710: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>31875: ZDI-CAN-5760: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>31876: ZDI-CAN-5766: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Hewlett Packard Enterprise (1)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"1.5\">\n<tr readability=\"3\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>31874: ZDI-CAN-5749: Zero Day Initiative Vulnerability (Hewlett Packard Enterprise Intelligent Management)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Microsoft (2)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"1.5\">\n<tr readability=\"3\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>31866: ZDI-CAN-6152: Zero Day Initiative Vulnerability (Microsoft Edge)<\/li>\n<li>31870: ZDI-CAN-5707: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Trend Micro (1)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>31885: ZDI-CAN-5807: Zero Day Initiative Vulnerability (Trend Micro Smart Protection Server)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>WECON (5)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"4\">\n<tr readability=\"8\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>31878: ZDI-CAN-5787: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>31880: ZDI-CAN-5790: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>31882: ZDI-CAN-5796: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>31883: ZDI-CAN-5798,5799,5802-5804: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>31884: ZDI-CAN-5805,5806: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-21-2018\/\">weekly recap<\/a>.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I ended up at an urgent care clinic earlier this week and found out I have strep throat. The doctor who examined me asked me what medicine I had taken prior to my visit to help alleviate my throat pain, to which I replied, \u201cI took a multi-symptom liquid medicine because the pain was keeping&#8230;<br \/>\nThe post TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018 appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2127,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[184,309,1016,230,306,307,1017,308,1018],"class_list":["post-2126","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-adobe","tag-digital-vaccine","tag-hewlett-packard-enterprise","tag-microsoft","tag-network","tag-security","tag-wecon","tag-zero-day-initiative","tag-zero-day-filters"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-01T14:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"205\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018\",\"datePublished\":\"2018-06-01T14:08:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/\"},\"wordCount\":597,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg\",\"keywords\":[\"adobe\",\"Digital Vaccine\",\"Hewlett Packard Enterprise\",\"Microsoft\",\"Network\",\"Security\",\"WECON\",\"Zero Day Initiative\",\"zero-day filters\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/\",\"name\":\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg\",\"datePublished\":\"2018-06-01T14:08:40+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg\",\"width\":300,\"height\":205},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"adobe\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/adobe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/","og_locale":"en_US","og_type":"article","og_title":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-01T14:08:40+00:00","og_image":[{"width":300,"height":205,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018","datePublished":"2018-06-01T14:08:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/"},"wordCount":597,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg","keywords":["adobe","Digital Vaccine","Hewlett Packard Enterprise","Microsoft","Network","Security","WECON","Zero Day Initiative","zero-day filters"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/","url":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/","name":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg","datePublished":"2018-06-01T14:08:40+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018.jpg","width":300,"height":205},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-28-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"adobe","item":"https:\/\/www.threatshub.org\/blog\/tag\/adobe\/"},{"@type":"ListItem","position":3,"name":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 28, 2018"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2126"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2126\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2127"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}