Adobe Patches Exploited Vulnerability

Adobe Patches Exploited Vulnerability

Adobe rushed out an emergency patch to fix a Zero-Day threat. According to Krebs on Security, Adobe is warning that the vulnerability is already being exploited in active attacks.

The critical bug exists in all versions of Flash. Ars Technica added that the serucity updates for Windows, Mac, Linux, and ChromeOS should prevent an attacker from taking control of the affected system. The attackers are using a newer type of ransomware dubbed Cerber, which is understood to have been in the wild since at least March 31.

Our Analysis

Per PC World, Flash will be automatically updated in Google Chrome across all platforms. Microsoft Edge and Internet Explorer for Windows 10 and Internet Explorer for Windows 8.1. If you have Flash Player that isn’t automatically updated, then you need to update to the most current version or remove for your system.

The current version of Flash Player for Windows/Mac is 21.0.0.213 and 11.2.202.616 on Linux. In these situations, there isn’t much the user community can do besides wait for the company to release the fix to the security hole.

It is however recommended that if you are on Windows 10, that you just remove Flash Player from your PC. The broswers have it and keep it up to date. If you use Google Chrome on any system, then you do not need Flash Player either. Flash Player has been frequently targeted over the years and still is a huge security risk.

Other APS Posts

Iranian hackers hit with Federal charges
Spear Phishermen Target Corporate W-2 Data
Google Fixes Kernel Vulnerability
4 Things to Know About Ransomware
Ransomware Hits Mac Computers
IRS Targeted in Another Cyberattack

Thanks for stopping by and reading our blog. We would appreciate if you could subscribe (assuming you like what you read; we think you will). This is meant to be informative and to provide value to anyone who reads this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.

Be sure to subscribe to this blog and to our Podcast.

If you have ANY Cybersecurity needs, please contact us and a member of our staff with promptly reply to your question or concern.

References

Ars Technica
Krebs on Security
PC World


Enter your email address:


Delivered by FeedBurner


Subscribe to our mailing list

* indicates required







About Scott Entsminger

Scott Entsminger was born and raised in Virginia. He graduated from Radford University with a Bachelor’s of Science in Criminal Justice. Scott has worked for the Department of Defense since graduating college. He is an expert in Windows Administration; with specific experience in Group Policy and vulnerability remediation. He also has specific experience in Information Assurance (IA) and Cyber Security. Scott holds the CompTIA Security+ certification. He is always looking to diversify his skillset. Scott is an avid sports fan, particularly baseball. He also is an avid gamer and enjoys learning different skills involving his PC.