HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Enterprise security: What’s new for the week of July 21st 2014

Here’s what’s new this week in Security Intelligence & Zero-Day Coverage for HP TippingPoint:

 

New trojan affecting online banking

These are some “Dyre” times for online banking customers but not if you’re an HP TippingPoint customer! There is a nasty Trojan--named Dyre--out there causing network security mayhem and stealing confidential data from online banking customers. But with the TippingPoint Next-Generation Intrusion Prevention System (IPS), and our next-generation firewall, your information is safe! Read more about how HP TippingPoint DVLabs team keeps you covered in this blog post!

 

TippingPoint teams up with Lastline

Cyber criminals have become more sophisticated and more determined than ever. Protecting your business from advanced malware requires new techniques tuned to these emerging threats. Now, HP TippingPoint Security Management System works with Lastline to provide an advanced layer of protection against the most sophisticated attacks.

 

 Attend the webinar to learn how:

  • Lastline uses the HP TippingPoint Advanced Threat application programming interface (API) to integrate their global threat intelligence and advanced malware detection capabilities with HP TippingPoint
  • The industry-leading security intelligence of HP TippingPoint and Lastline’s innovative products combine to help you stay ahead of the bad guys

Open Source Security Intelligence

The HP Security Research team showcases the latest Open Source Intelligence on their blog. We encourage you to visit the HP Security Research blog and learn more.

 

 

This week’s  Zero Day Filters released
Vendor: Microsoft

  • 16500: HTTP: Microsoft Internet Explorer CPeerFactoryUrlMap Use-After-Free Vulnerability
    (ZDI-14-175)
  • 16502: ZDI-CAN-2391
  • 16503: ZDI-CAN-2393
  • 16508: ZDI-CAN-2397
  • 16509: ZDI-CAN-2398
  • 16511: ZDI-CAN-2403
  • 16512: ZDI-CAN-2411
  • 16513: ZDI-CAN-2412
  • 16514: ZDI-CAN-2416

 

Vendor: Mozilla

  • 16507: ZDI-CAN-2394

 

Vendor: Samsung

  • 16501: ZDI-CAN-2358

 

 

Don’t forget to check out the Weekly Recap blog  post if you want a one stop shop of all the activity posted last week.


Visit the following links for additional information on:

Be sure to join us at HP Protect, September 8-11, in Washington, D.C!

 

HP TippingPoint Network Security solutions

When every second matters, HP TippingPoint delivers industry-leading security intelligence powered by HP TippingPoint DVLabs—keeping you ahead of the threats. With simple, reliable and effective products including TippingPoint Next-Generation Intrusion Prevention System (IPS),  TippingPoint Next-Generation Firewall, and the TippingPoint Security Management System, we are on your side, delivering proactive network security protection.Learn more about how HP TippingPoint can help you with your network security solutions.

Labels: DVLabs| TippingPoint
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.