{"id":4734,"date":"2018-06-29T14:18:45","date_gmt":"2018-06-29T14:18:45","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541599"},"modified":"2018-06-29T14:18:45","modified_gmt":"2018-06-29T14:18:45","slug":"tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018"},"content":{"rendered":"<div class=\"post-text\" readability=\"59.15160230074\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>I have never reverse engineered anything, but I did dismantle a Betamax VCR and put it back together without an instruction manual. My little brother liked to use the tape slot as a garage for his Hot Wheels\u00ae toy cars. We were usually able to take out the cars without any issues, but one day, he finally jammed enough cars in the tape slot and made it impossible to get them out. So, at the age of 10, I pulled out some tools, took the VCR apart, threw the cars at my little brother, and managed to rebuild the VCR so that it worked again.<\/p>\n<p>While I can only boast about my useless skill of repairing obsolete video players, Jasiel Spelman, also known as <a href=\"https:\/\/twitter.com\/wanderingglitch\">@WanderingGlitch<\/a>, does know a thing or two about reverse engineering. Earlier this week, he posted a blog on the Zero Day Initiative (ZDI) web site covering the topic of variant hunting as part of the MindshaRE blog series that provides insight on various reversing techniques to security researchers and reverse engineers. In his blog, he explores two Apple iOS vulnerabilities reported by two different teams from the most recent <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/11\/2\/the-results-mobile-pwn2own-2017-day-two\">Mobile Pwn2Own<\/a> contest. To get an introduction to variant hunting and find out why Apple determined that the two bugs were given the same CVE, click <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/6\/26\/mindshare-variant-hunting-with-ida-python\">here<\/a>.<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 33 new zero-day filters covering six vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Adobe (4)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"2.5\">\n<tr readability=\"5\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>32227: ZDI-CAN-5743: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>32232: ZDI-CAN-6325: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>32233: ZDI-CAN-6339: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>32247: ZDI-CAN-6341: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Advantech (1)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>32250: TCP: Advantech WebAccess Node webvrpcs Arbitrary File Deletion Vulnerability (ZDI-18-499)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>GE (1)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>32222: HTTP: GE MDS PulseNET Remote Invocation Insecure Deserialization Vulnerability (ZDI-18-550)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Microsoft (6)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"2.5\">\n<tr readability=\"5\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>32236: ZDI-CAN-6262: Zero Day Initiative Vulnerability (Microsoft Internet Explorer)<\/li>\n<li>32249: ZDI-CAN-6344: Zero Day Initiative Vulnerability (Microsoft Internet Explorer)<\/li>\n<li>32252: ZDI-CAN-6340: Zero Day Initiative Vulnerability (Microsoft Office Excel)<\/li>\n<li>32254: ZDI-CAN-6255: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>32255: ZDI-CAN-6256: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>32256: ZDI-CAN-6258: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Oracle (1)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"1.5\">\n<tr readability=\"3\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>32234: HTTP: Oracle WebLogic Remote Diagnosis Assistant rda_tfa_ref_date Command Injection (ZDI-18-115)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>WECON (20)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"5.5\">\n<tr readability=\"11\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>32237: ZDI-CAN-5898: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32238: ZDI-CAN-5899: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32239: ZDI-CAN-5900: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32240: ZDI-CAN-5901: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32241: ZDI-CAN-5902: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32243: ZDI-CAN-5903: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32244: ZDI-CAN-5904: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32245: ZDI-CAN-5905: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32246: ZDI-CAN-5906: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32248: ZDI-CAN-5907: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32258: ZDI-CAN-5955: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32260: ZDI-CAN-5909: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32261: ZDI-CAN-5910: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32262: ZDI-CAN-5911,5908: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32263: ZDI-CAN-5953: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32264: ZDI-CAN-5912: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32265: ZDI-CAN-5951: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32266: ZDI-CAN-5940,5941,5942,5945,5947,5949: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32267: ZDI-CAN-5913: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32268: ZDI-CAN-5914-5923: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-18-2018\/\">weekly recap<\/a>.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have never reverse engineered anything, but I did dismantle a Betamax VCR and put it back together without an instruction manual. My little brother liked to use the tape slot as a garage for his Hot Wheels\u00ae toy cars. We were usually able to take out the cars without any issues, but one day,&#8230;<br \/>\nThe post TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018 appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[184,1344,309,1659,230,306,1660,307,802,1017,308,374],"class_list":["post-4734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-adobe","tag-advantech","tag-digital-vaccine","tag-ge","tag-microsoft","tag-network","tag-oracle","tag-security","tag-tippingpoint","tag-wecon","tag-zero-day-initiative","tag-zero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-29T14:18:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"205\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018\",\"datePublished\":\"2018-06-29T14:18:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/\"},\"wordCount\":592,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg\",\"keywords\":[\"adobe\",\"Advantech\",\"Digital Vaccine\",\"GE\",\"Microsoft\",\"Network\",\"Oracle\",\"Security\",\"TippingPoint\",\"WECON\",\"Zero Day Initiative\",\"zero-day\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/\",\"name\":\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg\",\"datePublished\":\"2018-06-29T14:18:45+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg\",\"width\":300,\"height\":205},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"adobe\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/adobe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/","og_locale":"en_US","og_type":"article","og_title":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-29T14:18:45+00:00","og_image":[{"width":300,"height":205,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018","datePublished":"2018-06-29T14:18:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/"},"wordCount":592,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg","keywords":["adobe","Advantech","Digital Vaccine","GE","Microsoft","Network","Oracle","Security","TippingPoint","WECON","Zero Day Initiative","zero-day"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/","url":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/","name":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg","datePublished":"2018-06-29T14:18:45+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018.jpg","width":300,"height":205},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"adobe","item":"https:\/\/www.threatshub.org\/blog\/tag\/adobe\/"},{"@type":"ListItem","position":3,"name":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4734"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4734\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4735"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}