{"id":2606,"date":"2019-08-16T19:35:49","date_gmt":"2019-08-16T16:35:49","guid":{"rendered":"http:\/\/gcp.ideus.com.tr\/index.php\/unit-42-named-top-zero-day-vulnerability-contributor-by-microsoft\/"},"modified":"2019-08-16T19:35:49","modified_gmt":"2019-08-16T16:35:49","slug":"unit-42-named-top-zero-day-vulnerability-contributor-by-microsoft","status":"publish","type":"post","link":"https:\/\/www.ideus.com.tr\/index.php\/unit-42-named-top-zero-day-vulnerability-contributor-by-microsoft\/","title":{"rendered":"Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft"},"content":{"rendered":"<div>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks is proud that Microsoft has recognized our Unit 42 global threat intelligence team with multiple awards for its contributions to vulnerability research, including<\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/08\/08\/microsoft-announces-top-three-contributing-partners-in-the-microsoft-active-protections-program-mapp\/\"><span style=\"font-weight: 400;\"> first place for discovery of Zero Day vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\">. Microsoft also recognized Unit 42 researchers Gal De Leon and Bar Lahav in its annual list of the <\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/08\/07\/announcing-2019-msrc-most-valuable-security-researchers\/\"><span style=\"font-weight: 400;\">Most Valuable Security Researchers<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unit 42, which also won third place for \u201cVulnerability Top Contributor,\u201d was the only research group to win in two categories at this year\u2019s Microsoft Active Protections Program (MAPP) Contributing Partners awards.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIt\u2019s an honor to be recognized by the MSRC team for responsibly disclosing these vulnerabilities to Microsoft and providing information needed to develop patches and protect customers,\u201d Gal De Leon said.\u00a0\u00a0<\/span><\/p>\n<figure id=\"attachment_101036\" style=\"width: 500px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" class=\"wp-image-101036 size-large\" src=\"http:\/\/gcp.ideus.com.tr\/wp-content\/uploads\/2019\/08\/galdeleon-2-500x333.jpg\" alt=\"\" width=\"500\" height=\"333\" srcset=\"http:\/\/gcp.ideus.com.tr\/wp-content\/uploads\/2019\/08\/galdeleon-2-500x333.jpg 500w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/galdeleon-2-230x153.jpg 230w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/galdeleon-2-768x512.jpg 768w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/galdeleon-2-450x300.jpg 450w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/galdeleon-2-60x40.jpg 60w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/galdeleon-2-874x583.jpg 874w\" sizes=\"(max-width: 500px) 100vw, 500px\"><figcaption class=\"wp-caption-text\">Unit 42 researcher Gal De Leon<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Unit 42 reported <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/acknowledgments\"><span style=\"font-weight: 400;\">27 zero-day vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> to Microsoft from July 1, 2018, to June 30, 2019.\u00a0 They include a Zero-Day local privilege escalation vulnerability in the Windows Error Reporting component, which was exploited in the wild. We discussed that vulnerability in a July 2 technical blog, <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/tale-of-a-windows-error-reporting-zero-day-cve-2019-0863\/\"><span style=\"font-weight: 400;\">Tale of a Windows Error Reporting Zero-Day (CVE-2019-0863)<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Zero-Day vulnerabilities are exploitable flaws in the code of legitimate applications and operating systems that haven\u2019t previously been publicly disclosed.\u00a0 They can be exploited by threat actors to launch attacks which are much tougher for organizations to protect against, even when they are using up-to-date security tools.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unit 42 is thrilled that its researchers were acknowledged by the Microsoft Security Response Center (MSRC) \u201cMost Valuable Security Researchers\u201d program for a fourth consecutive year<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We salute all 75 researchers who were honored at this year\u2019s awards, which were presented during the Black Hat conference in Las Vegas.<\/span><\/p>\n<p><a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/07\/30\/recognizing-security-researchers-in-2019\/\"><i><span style=\"font-weight: 400;\">Microsoft looks at the volume of vulnerability reports as well as their impact and accuracy when deciding who to recognize<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">, according to Sylvie Liu, security program manager for MSRC Community Programs.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks has identified more than 200 vulnerabilities in the ecosystems of vendors including Adobe, Apple, Google Android and Microsoft. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">By proactively identifying these vulnerabilities, developing protections for our customers, and sharing the information with the security community, we are removing weapons that attackers use to threaten organizations. Palo Alto Networks is a key participant in the <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/mapp\"><span style=\"font-weight: 400;\">Microsoft Active Protections Program<\/span><\/a><span style=\"font-weight: 400;\">, which provides early access to vulnerability information so that we can provide proactive protection to customers through Next Generation Firewall Threat Prevention Security Services subscriptions and Traps Advanced Endpoint Protection.<\/span><\/p>\n<p>Unit 42 reports on zero-day vulnerabilities and other threats are available on its <a href=\"https:\/\/unit42.paloaltonetworks.com\/\">threat research blog<\/a>.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-101010 size-large\" src=\"http:\/\/gcp.ideus.com.tr\/wp-content\/uploads\/2019\/08\/Picture-2-500x860.png\" alt=\"\" width=\"500\" height=\"860\" srcset=\"http:\/\/gcp.ideus.com.tr\/wp-content\/uploads\/2019\/08\/Picture-2-500x860.png 500w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/Picture-2-230x396.png 230w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/Picture-2-768x1321.png 768w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/Picture-2-174x300.png 174w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/Picture-2-23x40.png 23w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/08\/Picture-2.png 785w\" sizes=\"(max-width: 500px) 100vw, 500px\"><\/p>\n<p>\u00a0<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.paloaltonetworks.com\/2019\/08\/unit-42-named-top-zero-day-vulnerability-contributor-microsoft\/\">Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.paloaltonetworks.com\/\">Palo Alto Networks Blog<\/a>.<\/p>\n<p><img loading=\"lazy\" src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/6ZAhzleB76o\" height=\"1\" width=\"1\" alt=\"\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks is proud that Microsoft has recognized our Unit 42 global threat intelligence team with multiple awards for its contributions to vulnerability research, including first place for discovery of Zero Day vulnerabilities. Microsoft also recognized Unit 42 researchers Gal De Leon and Bar Lahav in its annual list of the Most Valuable Security<\/p>\n","protected":false},"author":1,"featured_media":2607,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[24],"tags":[141,33,29,27,34],"jetpack_featured_media_url":"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/galdeleon-2-500x333.jpg","_links":{"self":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/2606"}],"collection":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=2606"}],"version-history":[{"count":0,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/2606\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/media\/2607"}],"wp:attachment":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=2606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=2606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=2606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}