{"id":110820,"date":"2020-05-05T06:00:08","date_gmt":"2020-05-05T13:00:08","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=110820"},"modified":"2020-05-04T15:41:29","modified_gmt":"2020-05-04T22:41:29","slug":"unit-42-security-researcher-leaderboard","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/05\/unit-42-security-researcher-leaderboard\/","title":{"rendered":"Unit 42 Recognized by Microsoft on the MSRC Security Researcher Leaderboard"},"content":{"rendered":"<figure id=\"attachment_110854\" aria-describedby=\"caption-attachment-110854\" style=\"width: 400px\" class=\"wp-caption alignright\"><div style=\"max-width:100%\" data-width=\"400\"><span class=\"ar-custom\" style=\"padding-bottom:133.25%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-110854 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/Zhang.jpg\" alt=\"Zhibin Zhang, principal researcher, Unit 42, Palo Alto Networks\" width=\"400\" height=\"533\" \/><\/span><\/div><figcaption id=\"caption-attachment-110854\" class=\"wp-caption-text\">Zhibin Zhang, principal researcher, Unit 42, Palo Alto Networks<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks is proud to announce that Microsoft has recognized Zhibin Zhang, a principal researcher for Unit 42, on their <\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/04\/23\/msrc-q1-2020-leaderboard\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">MSRC Security Researcher Leaderboard<\/span><\/a><span style=\"font-weight: 400;\"> for Q1 2020.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Zhang leads a team dedicated to monitoring and covering critical and popular software vulnerabilities. Over his four-year tenure at Palo Alto Networks, he has been credited with <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/unit-42-discovers-vulnerabilities-in-adobe-acrobat-and-reader-and-foxit-reader-shares-threat-research-at-microsoft-bluehat-shanghai-2019\/\"><span style=\"font-weight: 400;\">discovering numerous critical vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> in the Adobe ecosystem. Zhang\u2019s more recent work has focused exclusively on vulnerability research around Microsoft products.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has recently expanded their efforts of recognizing security researchers who report vulnerabilities through <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/cvd\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Coordinated Vulnerability Disclosure<\/span><\/a><span style=\"font-weight: 400;\">. Their MSRC researcher recognition programs allows researchers to earn points for their contributions and be recognized in public leaderboards and rankings. <\/span><span style=\"font-weight: 400;\">Each valid vulnerability reported to the Microsoft Security Response Center receives points based on the severity and impact of the vulnerability.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With significant contributions and CVE generation over the last quarter, Zhang joins the ranks of fellow Unit 42 researchers Gal De Leon and Bar Lahav, who were previously recognized in Microsoft\u2019s annual list of the <\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/08\/07\/announcing-2019-msrc-most-valuable-security-researchers\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Most Valuable Security Researchers<\/span><\/a><span style=\"font-weight: 400;\">. For several of the contributions that led to his inclusion in the Q1 leaderboard, Zhang was assisted by fellow Unit 42 researcher, Bo Qu.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIt's a tremendous honor to be recognized on the latest MSRC Security Researcher Leaderboard,\" said Zhang. \"This recognition is a testament to the whole team's continuing dedication to produce in-depth research to prevent successful cyberattacks.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Microsoft, each quarterly leaderboard recognizes the security researchers who ranked at or above the 95th percentile based on their total points. This quarter\u2019s leaderboard reflects point values with the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Vulnerabilities that have been submitted and assessed by the MSRC team between January 1, 2020 and March 31, 2020<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Any vulnerabilities that were submitted between October 1, 2019 and December 31, 2019, but assessed after January 1, 2020<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Last year, Unit 42 also won first place as a top <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/08\/unit-42-named-top-zero-day-vulnerability-contributor-microsoft\/\"><span style=\"font-weight: 400;\">Zero-Day vulnerability contributor<\/span><\/a><span style=\"font-weight: 400;\"> and tied for third for top vulnerability contributor as part of the Microsoft Active Protections Program (MAPP) Contributing Partners awards. We are proud of the continued efforts made by our threat intelligence research team as they continue to leave a positive impact on the security ecosystem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To stay up-to-date on the latest research from Unit 42, check out their <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/\"><span style=\"font-weight: 400;\">threat intelligence blog.<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft recognized Zhibin Zhang on the MSRC Security Researcher Leaderboard for Q1 2020 for significant vulnerability research and CVE generation.<\/p>\n","protected":false},"author":39,"featured_media":108494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[586,515],"coauthors":[741],"class_list":["post-110820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-unit-42","tag-vulnerabilities"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/IMG_2009.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=110820"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110820\/revisions"}],"predecessor-version":[{"id":110869,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110820\/revisions\/110869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/108494"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=110820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=110820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=110820"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=110820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}